<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Check Point API example (mgmt_cli in bash) of how to filter using a string with spaces in it in API / CLI Discussion</title>
    <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Check-Point-API-example-mgmt-cli-in-bash-of-how-to-filter-using/m-p/253982#M9155</link>
    <description>&lt;P&gt;UPDATED 2025-07-28 :&amp;nbsp; defined ${JQ} and provided alternative script examples&lt;/P&gt;
&lt;P&gt;We have an undocumented issue that is required to build a more complex filter when searching for content that is space separated, like for example “Cisco WebEx” or “Cisco WebEx Recording” or “Cisco RV”.&lt;/P&gt;
&lt;P&gt;No where in documentation is this problem addressed, there are NO examples to be found (as of 2025-07-25, R82 JHF 34 and earlier)!&amp;nbsp; Sorry R&amp;amp;D, lacking documentation at any level for this is a problem.&lt;/P&gt;
&lt;P&gt;Now, I beat my head against this and tried some things, and found something interesting…&amp;nbsp; I’m using mgmt_cli, but this should apply in web api also!&lt;/P&gt;
&lt;P&gt;First the example of WHAT DOES NOT WORK! as a filter, since the space is apparently some delimeter to “stop” looking at what is provided...&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;[Expert@Mgmt-01:0]# mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco RV" -r true -f json | ${JQ} '.protections[] | ."name"'
"Cisco ACS Windows Bypass Authentication Unauthorized Access Ver2"
"Cisco Adaptive Security Appliance Buffer Overflow (CVE-2016-1287)"
"Cisco Adaptive Security Appliance Cross Site Scripting (CVE-2020-3580)"
"Cisco Adaptive Security Appliance Directory Traversal (CVE-2020-3452)"
"Cisco Adaptive Security Appliance Privilege Escalation (CVE-2016-6367)"
"Cisco Adaptive Security Appliance Privilege Escalation (CVE-2022-20759)"
"Cisco Adaptive Security Appliance Remote Code Execution (CVE-2018-0101)"
"Cisco Adaptive Security Appliance Web Services Denial of Service"
"Cisco AnyConnect Secure Mobility Client Privilege Escalation (CVE-2020-3153)"
"Cisco AnyConnect VPN Client ActiveX Code Execution"
"Cisco AnyConnect VPN Client Software Downgrade Code Execution"
"Cisco Application Networking Manager Default User Credentials Security Bypass"
"Cisco ASA Disable Password Remote Code Execution (CVE-2016-6366)"
"Cisco ASA VPN Portal Cross-Site Scripting"
"Cisco CNS Network Registrar Denial of Service"
"Cisco Collaboration Server Cross-Site Scripting (CVE-2010-0641)"
"Cisco Common Services Devices Center Cross Site Scripting"
"Cisco Common Services Framework Help Servlet Cross-Site Scripting"
"Cisco Data Center Network Manager Arbitrary File Deletion (CVE-2019-15981)"
"Cisco Data Center Network Manager Arbitrary File Upload"
"Cisco Data Center Network Manager Authentication Bypass (CVE-2019-15976)"
"Cisco Data Center Network Manager Command Injection"
"Cisco Data Center Network Manager Directory Traversal (CVE-2019-15980)"
"Cisco Data Center Network Manager SQL Injection (CVE-2019-15984)"
"Cisco Elastic Services Controller REST API Authentication Bypass (CVE-2019-1867)"
[Expert@Mgmt-01:0]#

&lt;/LI-CODE&gt;
&lt;P&gt;If you want to try it, here is just the mgmt_cli call, you need to be in expert to run this way:&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;export JQ="${CPDIR}/jq/jq"
mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco RV" -r true -f json | ${JQ} '.protections[] | ."name"'

# Alternatively

mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco RV" -r true -f json | jq '.protections[] | ."name"'&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;NOTE that we have nothing that is even close to something that should filter with “Cisco RV”.&amp;nbsp; Using the text like one would in SmartConsole fails!&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Eric_Beasley_0-1753482619930.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31054i3D7A152BB24146C4/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Eric_Beasley_0-1753482619930.png" alt="Eric_Beasley_0-1753482619930.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now for my example that works, we need to replace the space (“ “) with ampersand (“&amp;amp;”), all spaces in the required string!&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;[Expert@Mgmt-01:0]# mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco&amp;amp;RV" -r true -f json | ${JQ} '.protections[] | ."name"'
"Cisco RV Command Injection (CVE-2020-3331)"
"Cisco RV Routers Authentication Bypass (CVE-2018-0127)"
"Cisco RV Routers Authentication Bypass (CVE-2019-1898)"
"Cisco RV016 FIRMWARE Privilege Escalation (CVE-2023-20118)"
"Cisco RV132W Command Injection (CVE-2018-0125)"
"Cisco RV320 and RV325 Command Injection (CVE-2023-20117)"
"Cisco RV320 and RV325 Routers Information Disclosure (CVE-2019-1653)"
"Cisco RV320 Command Injection (CVE-2019-1652)"
"Cisco RV320 Firmware Command Injection (CVE-2023-20128)"
"Cisco RV340 Arbitrary File Upload (CVE-2023-20073)"
[Expert@Mgmt-01:0]#
&lt;/LI-CODE&gt;
&lt;P&gt;Again if you want to try it, here is just the mgmt_cli call, you need to be in expert to run this way:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;# Corrected 2025-07-28, missing "&amp;amp;"
export JQ="${CPDIR}/jq/jq"
mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco&amp;amp;RV" -r true -f json | ${JQ} '.protections[] | ."name"'

# Alternatively

mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco&amp;amp;RV" -r true -f json | jq '.protections[] | ."name"'
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Replacing the space (“ “) with ampersand (“&amp;amp;”) does the trick.&amp;nbsp; Let’s look at some more examples for verification…&lt;/P&gt;
&lt;P&gt;This time it’s “Cisco WebEx Recording”:&amp;nbsp; First with spaces&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;[Expert@Mgmt-01:0]# mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco WebEx Recording" -r true -f json | ${JQ} '.protections[] | ."name"'
"Cisco ACS Windows Bypass Authentication Unauthorized Access Ver2"
"Cisco Adaptive Security Appliance Buffer Overflow (CVE-2016-1287)"
"Cisco Adaptive Security Appliance Cross Site Scripting (CVE-2020-3580)"
"Cisco Adaptive Security Appliance Directory Traversal (CVE-2020-3452)"
"Cisco Adaptive Security Appliance Privilege Escalation (CVE-2016-6367)"
"Cisco Adaptive Security Appliance Privilege Escalation (CVE-2022-20759)"
"Cisco Adaptive Security Appliance Remote Code Execution (CVE-2018-0101)"
"Cisco Adaptive Security Appliance Web Services Denial of Service"
"Cisco AnyConnect Secure Mobility Client Privilege Escalation (CVE-2020-3153)"
"Cisco AnyConnect VPN Client ActiveX Code Execution"
"Cisco AnyConnect VPN Client Software Downgrade Code Execution"
"Cisco Application Networking Manager Default User Credentials Security Bypass"
"Cisco ASA Disable Password Remote Code Execution (CVE-2016-6366)"
"Cisco ASA VPN Portal Cross-Site Scripting"
"Cisco CNS Network Registrar Denial of Service"
"Cisco Collaboration Server Cross-Site Scripting (CVE-2010-0641)"
"Cisco Common Services Devices Center Cross Site Scripting"
"Cisco Common Services Framework Help Servlet Cross-Site Scripting"
"Cisco Data Center Network Manager Arbitrary File Deletion (CVE-2019-15981)"
"Cisco Data Center Network Manager Arbitrary File Upload"
"Cisco Data Center Network Manager Authentication Bypass (CVE-2019-15976)"
"Cisco Data Center Network Manager Command Injection"
"Cisco Data Center Network Manager Directory Traversal (CVE-2019-15980)"
"Cisco Data Center Network Manager SQL Injection (CVE-2019-15984)"
"Cisco Elastic Services Controller REST API Authentication Bypass (CVE-2019-1867)"
[Expert@Mgmt-01:0]#&lt;/LI-CODE&gt;
&lt;P&gt;Again if you want to try it, here is just the mgmt_cli call, you need to be in expert to run this way:&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;export JQ="${CPDIR}/jq/jq"
mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco WebEx Recording" -r true -f json | ${JQ} '.protections[] | ."name"'

# Alternatively

mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco WebEx Recording" -r true -f json | jq '.protections[] | ."name"'&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Again the original text that would work in SmartConsole fails as entered.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Eric_Beasley_1-1753482619932.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31055iB49244921015577D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Eric_Beasley_1-1753482619932.png" alt="Eric_Beasley_1-1753482619932.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Let’s try with replacing the space (“ “) with ampersand (“&amp;amp;”) trick:&lt;/P&gt;
&lt;P&gt;We’ll start with just the first part, so “Cisco WebEx” to see that there would be more:&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;[Expert@Mgmt-01:0]# mgmt_cli show threat-protections limit 250 offset 0 details-level "standard" filter "Cisco&amp;amp;WebEx" -r true -f json | ${JQ} '.protections[] | ."name"'
"Cisco WebEx Meeting Manager ActiveX Control Buffer Overflow"
"Cisco Webex Meetings Desktop App Update Service Command Injection (CVE-2018-15442)"
"Cisco WebEx Meetings Server and Center Remote Code Execution"
"Cisco WebEx Player ATAS32.DLL Remote Code Execution"
"Cisco WebEx Player ATDL2006.dll Heap Memory Corruption"
"Cisco WebEx Player Malformed .WRF File Code Execution"
"Cisco WebEx Recording Format Player atas32.dll Integer Overflow"
"Cisco WebEx Recording Format Player atas32.dll Memory Corruption"
"Cisco WebEx Recording Format Player atas32.dll Subrecords Integer Overflow"
"Cisco WebEx Recording Format Player atdl2006.dll Buffer Overflow"
"Cisco WebEx Recording Format Player atdl2006.dll Integer Overflow"
"Cisco WebEx Recording Format Player Buffer Overflow (CVE-2012-1337)"
"Cisco Webex Teams code Injection (CVE-2019-1636)"
"Cisco WebEx UCF atucfobj.dll ActiveX NewObject Buffer Overflow - Ver2"
[Expert@Mgmt-01:0]#&lt;/LI-CODE&gt;
&lt;P&gt;Again if you want to try it,&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;export JQ="${CPDIR}/jq/jq"
mgmt_cli show threat-protections limit 250 offset 0 details-level "standard" filter "Cisco&amp;amp;WebEx" -r true -f json | ${JQ} '.protections[] | ."name"'

# Alternatively

mgmt_cli show threat-protections limit 250 offset 0 details-level "standard" filter "Cisco&amp;amp;WebEx" -r true -f json | jq '.protections[] | ."name"'&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And now the full “Cisco WebEx Recording” as we would like to filter:&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;[Expert@Mgmt-01:0]# mgmt_cli show threat-protections limit 250 offset 0 details-level "standard" filter "Cisco&amp;amp;WebEx&amp;amp;Recording" -r true -f json | ${JQ} '.protections[] | ."name"'
"Cisco WebEx Recording Format Player atas32.dll Integer Overflow"
"Cisco WebEx Recording Format Player atas32.dll Memory Corruption"
"Cisco WebEx Recording Format Player atas32.dll Subrecords Integer Overflow"
"Cisco WebEx Recording Format Player atdl2006.dll Buffer Overflow"
"Cisco WebEx Recording Format Player atdl2006.dll Integer Overflow"
"Cisco WebEx Recording Format Player Buffer Overflow (CVE-2012-1337)"

[Expert@Mgmt-01:0]# mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco&amp;amp;WebEx&amp;amp;Recording" -r true -f json | ${JQ} '.protections[] | ."name"'
"Cisco WebEx Recording Format Player atas32.dll Integer Overflow"
"Cisco WebEx Recording Format Player atas32.dll Memory Corruption"
"Cisco WebEx Recording Format Player atas32.dll Subrecords Integer Overflow"
"Cisco WebEx Recording Format Player atdl2006.dll Buffer Overflow"
"Cisco WebEx Recording Format Player atdl2006.dll Integer Overflow"
"Cisco WebEx Recording Format Player Buffer Overflow (CVE-2012-1337)"
[Expert@Mgmt-01:0]#&lt;/LI-CODE&gt;
&lt;P&gt;And the pure command line code:&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;export JQ="${CPDIR}/jq/jq"
mgmt_cli show threat-protections limit 250 offset 0 details-level "standard" filter "Cisco&amp;amp;WebEx&amp;amp;Recording" -r true -f json | ${JQ} '.protections[] | ."name"'

# Alternatively

mgmt_cli show threat-protections limit 250 offset 0 details-level "standard" filter "Cisco&amp;amp;WebEx&amp;amp;Recording" -r true -f json | jq '.protections[] | ."name"'&lt;/LI-CODE&gt;
&lt;P&gt;or:&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;export JQ="${CPDIR}/jq/jq"
mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco&amp;amp;WebEx&amp;amp;Recording" -r true -f json | ${JQ} '.protections[] | ."name"'

# Alternatively

mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco&amp;amp;WebEx&amp;amp;Recording" -r true -f json | jq '.protections[] | ."name"'&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the above example I ran it twice to also show that expanding the range for limit versus offset didn’t change the results.&lt;/P&gt;
&lt;P&gt;Which brings the need for a proper example to check for the total number of items we would get in a filter, since that might be needed to iterate a few times for large filter results in excess of 500 results:&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;[Expert@Mgmt-01:0]# mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco" -r true -f json | ${JQ} '.total'
163

[Expert@Mgmt-01:0]# mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco&amp;amp;WebEx" -r true -f json | ${JQ} '.total'
14

[Expert@Mgmt-01:0]# mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco&amp;amp;WebEx&amp;amp;Recording" -r true -f json | ${JQ} '.total'
6

[Expert@Mgmt-01:0]# mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco&amp;amp;RV" -r true -f json | ${JQ} '.total'
10

[Expert@Mgmt-01:0]# mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Adobe" -r true -f json | ${JQ} '.total'
2489

[Expert@CORE-G3-Mgmt-01:0]#&lt;/LI-CODE&gt;
&lt;P&gt;And just the code for those who want to copy-paste:&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;export JQ="${CPDIR}/jq/jq"
mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco" -r true -f json | ${JQ} '.total'

mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco&amp;amp;WebEx" -r true -f json | ${JQ} '.total'

mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco&amp;amp;WebEx&amp;amp;Recording" -r true -f json | ${JQ} '.total'

mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco&amp;amp;RV" -r true -f json | ${JQ} '.total'

mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Adobe" -r true -f json | ${JQ} '.total'

# Alternatively

mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco" -r true -f json | jq '.total'

mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco&amp;amp;WebEx" -r true -f json | jq '.total'

mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco&amp;amp;WebEx&amp;amp;Recording" -r true -f json | jq '.total'

mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco&amp;amp;RV" -r true -f json | jq '.total'

mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Adobe" -r true -f json | jq '.total'
&lt;/LI-CODE&gt;
&lt;P&gt;For the example above with “Adobe” we may need to iterate up to 5 times if the limit is 500 and we want the complete set, but that is an example for another time.&lt;/P&gt;
&lt;P&gt;BR, thanks for challenge, and I hope everyone finds some use in this,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Eric&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PS:&amp;nbsp; Why ${JQ} ?&amp;nbsp; In my environment I map ${JQ} to jq version 1.6 that I've put on the system to get the best jq results with the more current version than the default version 1.4 implemented on Gaia OS.&lt;/P&gt;</description>
    <pubDate>Mon, 28 Jul 2025 15:43:50 GMT</pubDate>
    <dc:creator>Eric_Beasley</dc:creator>
    <dc:date>2025-07-28T15:43:50Z</dc:date>
    <item>
      <title>Check Point API example (mgmt_cli in bash) of how to filter using a string with spaces in it</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Check-Point-API-example-mgmt-cli-in-bash-of-how-to-filter-using/m-p/253982#M9155</link>
      <description>&lt;P&gt;UPDATED 2025-07-28 :&amp;nbsp; defined ${JQ} and provided alternative script examples&lt;/P&gt;
&lt;P&gt;We have an undocumented issue that is required to build a more complex filter when searching for content that is space separated, like for example “Cisco WebEx” or “Cisco WebEx Recording” or “Cisco RV”.&lt;/P&gt;
&lt;P&gt;No where in documentation is this problem addressed, there are NO examples to be found (as of 2025-07-25, R82 JHF 34 and earlier)!&amp;nbsp; Sorry R&amp;amp;D, lacking documentation at any level for this is a problem.&lt;/P&gt;
&lt;P&gt;Now, I beat my head against this and tried some things, and found something interesting…&amp;nbsp; I’m using mgmt_cli, but this should apply in web api also!&lt;/P&gt;
&lt;P&gt;First the example of WHAT DOES NOT WORK! as a filter, since the space is apparently some delimeter to “stop” looking at what is provided...&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;[Expert@Mgmt-01:0]# mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco RV" -r true -f json | ${JQ} '.protections[] | ."name"'
"Cisco ACS Windows Bypass Authentication Unauthorized Access Ver2"
"Cisco Adaptive Security Appliance Buffer Overflow (CVE-2016-1287)"
"Cisco Adaptive Security Appliance Cross Site Scripting (CVE-2020-3580)"
"Cisco Adaptive Security Appliance Directory Traversal (CVE-2020-3452)"
"Cisco Adaptive Security Appliance Privilege Escalation (CVE-2016-6367)"
"Cisco Adaptive Security Appliance Privilege Escalation (CVE-2022-20759)"
"Cisco Adaptive Security Appliance Remote Code Execution (CVE-2018-0101)"
"Cisco Adaptive Security Appliance Web Services Denial of Service"
"Cisco AnyConnect Secure Mobility Client Privilege Escalation (CVE-2020-3153)"
"Cisco AnyConnect VPN Client ActiveX Code Execution"
"Cisco AnyConnect VPN Client Software Downgrade Code Execution"
"Cisco Application Networking Manager Default User Credentials Security Bypass"
"Cisco ASA Disable Password Remote Code Execution (CVE-2016-6366)"
"Cisco ASA VPN Portal Cross-Site Scripting"
"Cisco CNS Network Registrar Denial of Service"
"Cisco Collaboration Server Cross-Site Scripting (CVE-2010-0641)"
"Cisco Common Services Devices Center Cross Site Scripting"
"Cisco Common Services Framework Help Servlet Cross-Site Scripting"
"Cisco Data Center Network Manager Arbitrary File Deletion (CVE-2019-15981)"
"Cisco Data Center Network Manager Arbitrary File Upload"
"Cisco Data Center Network Manager Authentication Bypass (CVE-2019-15976)"
"Cisco Data Center Network Manager Command Injection"
"Cisco Data Center Network Manager Directory Traversal (CVE-2019-15980)"
"Cisco Data Center Network Manager SQL Injection (CVE-2019-15984)"
"Cisco Elastic Services Controller REST API Authentication Bypass (CVE-2019-1867)"
[Expert@Mgmt-01:0]#

&lt;/LI-CODE&gt;
&lt;P&gt;If you want to try it, here is just the mgmt_cli call, you need to be in expert to run this way:&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;export JQ="${CPDIR}/jq/jq"
mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco RV" -r true -f json | ${JQ} '.protections[] | ."name"'

# Alternatively

mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco RV" -r true -f json | jq '.protections[] | ."name"'&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;NOTE that we have nothing that is even close to something that should filter with “Cisco RV”.&amp;nbsp; Using the text like one would in SmartConsole fails!&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Eric_Beasley_0-1753482619930.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31054i3D7A152BB24146C4/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Eric_Beasley_0-1753482619930.png" alt="Eric_Beasley_0-1753482619930.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now for my example that works, we need to replace the space (“ “) with ampersand (“&amp;amp;”), all spaces in the required string!&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;[Expert@Mgmt-01:0]# mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco&amp;amp;RV" -r true -f json | ${JQ} '.protections[] | ."name"'
"Cisco RV Command Injection (CVE-2020-3331)"
"Cisco RV Routers Authentication Bypass (CVE-2018-0127)"
"Cisco RV Routers Authentication Bypass (CVE-2019-1898)"
"Cisco RV016 FIRMWARE Privilege Escalation (CVE-2023-20118)"
"Cisco RV132W Command Injection (CVE-2018-0125)"
"Cisco RV320 and RV325 Command Injection (CVE-2023-20117)"
"Cisco RV320 and RV325 Routers Information Disclosure (CVE-2019-1653)"
"Cisco RV320 Command Injection (CVE-2019-1652)"
"Cisco RV320 Firmware Command Injection (CVE-2023-20128)"
"Cisco RV340 Arbitrary File Upload (CVE-2023-20073)"
[Expert@Mgmt-01:0]#
&lt;/LI-CODE&gt;
&lt;P&gt;Again if you want to try it, here is just the mgmt_cli call, you need to be in expert to run this way:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;# Corrected 2025-07-28, missing "&amp;amp;"
export JQ="${CPDIR}/jq/jq"
mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco&amp;amp;RV" -r true -f json | ${JQ} '.protections[] | ."name"'

# Alternatively

mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco&amp;amp;RV" -r true -f json | jq '.protections[] | ."name"'
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Replacing the space (“ “) with ampersand (“&amp;amp;”) does the trick.&amp;nbsp; Let’s look at some more examples for verification…&lt;/P&gt;
&lt;P&gt;This time it’s “Cisco WebEx Recording”:&amp;nbsp; First with spaces&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;[Expert@Mgmt-01:0]# mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco WebEx Recording" -r true -f json | ${JQ} '.protections[] | ."name"'
"Cisco ACS Windows Bypass Authentication Unauthorized Access Ver2"
"Cisco Adaptive Security Appliance Buffer Overflow (CVE-2016-1287)"
"Cisco Adaptive Security Appliance Cross Site Scripting (CVE-2020-3580)"
"Cisco Adaptive Security Appliance Directory Traversal (CVE-2020-3452)"
"Cisco Adaptive Security Appliance Privilege Escalation (CVE-2016-6367)"
"Cisco Adaptive Security Appliance Privilege Escalation (CVE-2022-20759)"
"Cisco Adaptive Security Appliance Remote Code Execution (CVE-2018-0101)"
"Cisco Adaptive Security Appliance Web Services Denial of Service"
"Cisco AnyConnect Secure Mobility Client Privilege Escalation (CVE-2020-3153)"
"Cisco AnyConnect VPN Client ActiveX Code Execution"
"Cisco AnyConnect VPN Client Software Downgrade Code Execution"
"Cisco Application Networking Manager Default User Credentials Security Bypass"
"Cisco ASA Disable Password Remote Code Execution (CVE-2016-6366)"
"Cisco ASA VPN Portal Cross-Site Scripting"
"Cisco CNS Network Registrar Denial of Service"
"Cisco Collaboration Server Cross-Site Scripting (CVE-2010-0641)"
"Cisco Common Services Devices Center Cross Site Scripting"
"Cisco Common Services Framework Help Servlet Cross-Site Scripting"
"Cisco Data Center Network Manager Arbitrary File Deletion (CVE-2019-15981)"
"Cisco Data Center Network Manager Arbitrary File Upload"
"Cisco Data Center Network Manager Authentication Bypass (CVE-2019-15976)"
"Cisco Data Center Network Manager Command Injection"
"Cisco Data Center Network Manager Directory Traversal (CVE-2019-15980)"
"Cisco Data Center Network Manager SQL Injection (CVE-2019-15984)"
"Cisco Elastic Services Controller REST API Authentication Bypass (CVE-2019-1867)"
[Expert@Mgmt-01:0]#&lt;/LI-CODE&gt;
&lt;P&gt;Again if you want to try it, here is just the mgmt_cli call, you need to be in expert to run this way:&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;export JQ="${CPDIR}/jq/jq"
mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco WebEx Recording" -r true -f json | ${JQ} '.protections[] | ."name"'

# Alternatively

mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco WebEx Recording" -r true -f json | jq '.protections[] | ."name"'&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Again the original text that would work in SmartConsole fails as entered.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Eric_Beasley_1-1753482619932.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31055iB49244921015577D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Eric_Beasley_1-1753482619932.png" alt="Eric_Beasley_1-1753482619932.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Let’s try with replacing the space (“ “) with ampersand (“&amp;amp;”) trick:&lt;/P&gt;
&lt;P&gt;We’ll start with just the first part, so “Cisco WebEx” to see that there would be more:&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;[Expert@Mgmt-01:0]# mgmt_cli show threat-protections limit 250 offset 0 details-level "standard" filter "Cisco&amp;amp;WebEx" -r true -f json | ${JQ} '.protections[] | ."name"'
"Cisco WebEx Meeting Manager ActiveX Control Buffer Overflow"
"Cisco Webex Meetings Desktop App Update Service Command Injection (CVE-2018-15442)"
"Cisco WebEx Meetings Server and Center Remote Code Execution"
"Cisco WebEx Player ATAS32.DLL Remote Code Execution"
"Cisco WebEx Player ATDL2006.dll Heap Memory Corruption"
"Cisco WebEx Player Malformed .WRF File Code Execution"
"Cisco WebEx Recording Format Player atas32.dll Integer Overflow"
"Cisco WebEx Recording Format Player atas32.dll Memory Corruption"
"Cisco WebEx Recording Format Player atas32.dll Subrecords Integer Overflow"
"Cisco WebEx Recording Format Player atdl2006.dll Buffer Overflow"
"Cisco WebEx Recording Format Player atdl2006.dll Integer Overflow"
"Cisco WebEx Recording Format Player Buffer Overflow (CVE-2012-1337)"
"Cisco Webex Teams code Injection (CVE-2019-1636)"
"Cisco WebEx UCF atucfobj.dll ActiveX NewObject Buffer Overflow - Ver2"
[Expert@Mgmt-01:0]#&lt;/LI-CODE&gt;
&lt;P&gt;Again if you want to try it,&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;export JQ="${CPDIR}/jq/jq"
mgmt_cli show threat-protections limit 250 offset 0 details-level "standard" filter "Cisco&amp;amp;WebEx" -r true -f json | ${JQ} '.protections[] | ."name"'

# Alternatively

mgmt_cli show threat-protections limit 250 offset 0 details-level "standard" filter "Cisco&amp;amp;WebEx" -r true -f json | jq '.protections[] | ."name"'&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And now the full “Cisco WebEx Recording” as we would like to filter:&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;[Expert@Mgmt-01:0]# mgmt_cli show threat-protections limit 250 offset 0 details-level "standard" filter "Cisco&amp;amp;WebEx&amp;amp;Recording" -r true -f json | ${JQ} '.protections[] | ."name"'
"Cisco WebEx Recording Format Player atas32.dll Integer Overflow"
"Cisco WebEx Recording Format Player atas32.dll Memory Corruption"
"Cisco WebEx Recording Format Player atas32.dll Subrecords Integer Overflow"
"Cisco WebEx Recording Format Player atdl2006.dll Buffer Overflow"
"Cisco WebEx Recording Format Player atdl2006.dll Integer Overflow"
"Cisco WebEx Recording Format Player Buffer Overflow (CVE-2012-1337)"

[Expert@Mgmt-01:0]# mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco&amp;amp;WebEx&amp;amp;Recording" -r true -f json | ${JQ} '.protections[] | ."name"'
"Cisco WebEx Recording Format Player atas32.dll Integer Overflow"
"Cisco WebEx Recording Format Player atas32.dll Memory Corruption"
"Cisco WebEx Recording Format Player atas32.dll Subrecords Integer Overflow"
"Cisco WebEx Recording Format Player atdl2006.dll Buffer Overflow"
"Cisco WebEx Recording Format Player atdl2006.dll Integer Overflow"
"Cisco WebEx Recording Format Player Buffer Overflow (CVE-2012-1337)"
[Expert@Mgmt-01:0]#&lt;/LI-CODE&gt;
&lt;P&gt;And the pure command line code:&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;export JQ="${CPDIR}/jq/jq"
mgmt_cli show threat-protections limit 250 offset 0 details-level "standard" filter "Cisco&amp;amp;WebEx&amp;amp;Recording" -r true -f json | ${JQ} '.protections[] | ."name"'

# Alternatively

mgmt_cli show threat-protections limit 250 offset 0 details-level "standard" filter "Cisco&amp;amp;WebEx&amp;amp;Recording" -r true -f json | jq '.protections[] | ."name"'&lt;/LI-CODE&gt;
&lt;P&gt;or:&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;export JQ="${CPDIR}/jq/jq"
mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco&amp;amp;WebEx&amp;amp;Recording" -r true -f json | ${JQ} '.protections[] | ."name"'

# Alternatively

mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco&amp;amp;WebEx&amp;amp;Recording" -r true -f json | jq '.protections[] | ."name"'&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the above example I ran it twice to also show that expanding the range for limit versus offset didn’t change the results.&lt;/P&gt;
&lt;P&gt;Which brings the need for a proper example to check for the total number of items we would get in a filter, since that might be needed to iterate a few times for large filter results in excess of 500 results:&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;[Expert@Mgmt-01:0]# mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco" -r true -f json | ${JQ} '.total'
163

[Expert@Mgmt-01:0]# mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco&amp;amp;WebEx" -r true -f json | ${JQ} '.total'
14

[Expert@Mgmt-01:0]# mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco&amp;amp;WebEx&amp;amp;Recording" -r true -f json | ${JQ} '.total'
6

[Expert@Mgmt-01:0]# mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco&amp;amp;RV" -r true -f json | ${JQ} '.total'
10

[Expert@Mgmt-01:0]# mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Adobe" -r true -f json | ${JQ} '.total'
2489

[Expert@CORE-G3-Mgmt-01:0]#&lt;/LI-CODE&gt;
&lt;P&gt;And just the code for those who want to copy-paste:&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;export JQ="${CPDIR}/jq/jq"
mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco" -r true -f json | ${JQ} '.total'

mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco&amp;amp;WebEx" -r true -f json | ${JQ} '.total'

mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco&amp;amp;WebEx&amp;amp;Recording" -r true -f json | ${JQ} '.total'

mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco&amp;amp;RV" -r true -f json | ${JQ} '.total'

mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Adobe" -r true -f json | ${JQ} '.total'

# Alternatively

mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco" -r true -f json | jq '.total'

mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco&amp;amp;WebEx" -r true -f json | jq '.total'

mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco&amp;amp;WebEx&amp;amp;Recording" -r true -f json | jq '.total'

mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco&amp;amp;RV" -r true -f json | jq '.total'

mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Adobe" -r true -f json | jq '.total'
&lt;/LI-CODE&gt;
&lt;P&gt;For the example above with “Adobe” we may need to iterate up to 5 times if the limit is 500 and we want the complete set, but that is an example for another time.&lt;/P&gt;
&lt;P&gt;BR, thanks for challenge, and I hope everyone finds some use in this,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Eric&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PS:&amp;nbsp; Why ${JQ} ?&amp;nbsp; In my environment I map ${JQ} to jq version 1.6 that I've put on the system to get the best jq results with the more current version than the default version 1.4 implemented on Gaia OS.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jul 2025 15:43:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Check-Point-API-example-mgmt-cli-in-bash-of-how-to-filter-using/m-p/253982#M9155</guid>
      <dc:creator>Eric_Beasley</dc:creator>
      <dc:date>2025-07-28T15:43:50Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point API example (mgmt_cli in bash) of how to filter using a string with spaces in it</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Check-Point-API-example-mgmt-cli-in-bash-of-how-to-filter-using/m-p/253984#M9156</link>
      <description>&lt;P&gt;Great work!&lt;BR /&gt;Curious how you stumbled on the ampersand.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jul 2025 23:44:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Check-Point-API-example-mgmt-cli-in-bash-of-how-to-filter-using/m-p/253984#M9156</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-07-25T23:44:55Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point API example (mgmt_cli in bash) of how to filter using a string with spaces in it</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Check-Point-API-example-mgmt-cli-in-bash-of-how-to-filter-using/m-p/253989#M9157</link>
      <description>&lt;P&gt;Now you got me curious. I will test this on both R81.20 and R82 in the lab.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sat, 26 Jul 2025 00:44:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Check-Point-API-example-mgmt-cli-in-bash-of-how-to-filter-using/m-p/253989#M9157</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-07-26T00:44:07Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point API example (mgmt_cli in bash) of how to filter using a string with spaces in it</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Check-Point-API-example-mgmt-cli-in-bash-of-how-to-filter-using/m-p/253996#M9160</link>
      <description>&lt;P&gt;Just tried on R82 jumbo 34 mgmt lab and all I get is below.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;[Expert@CP-MANAGEMENT:0]# mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco RV" -r true -f json | ${JQ} '.protections[] | ."name"'&lt;BR /&gt;-bash: .protections[] | ."name": command not found&lt;BR /&gt;[Expert@CP-MANAGEMENT:0]#&lt;/P&gt;</description>
      <pubDate>Sat, 26 Jul 2025 11:59:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Check-Point-API-example-mgmt-cli-in-bash-of-how-to-filter-using/m-p/253996#M9160</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-07-26T11:59:34Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point API example (mgmt_cli in bash) of how to filter using a string with spaces in it</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Check-Point-API-example-mgmt-cli-in-bash-of-how-to-filter-using/m-p/254015#M9163</link>
      <description>&lt;P&gt;That's because you haven't defined the JQ environment variable, so it expands to nothing, leaving&amp;nbsp;&lt;SPAN&gt;'.protections[] | ."name"' as the next token passed to the shell. Either defining JQ="jq" or replacing "${JQ}" with jq will work.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 26 Jul 2025 21:34:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Check-Point-API-example-mgmt-cli-in-bash-of-how-to-filter-using/m-p/254015#M9163</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2025-07-26T21:34:00Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point API example (mgmt_cli in bash) of how to filter using a string with spaces in it</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Check-Point-API-example-mgmt-cli-in-bash-of-how-to-filter-using/m-p/254016#M9164</link>
      <description>&lt;P&gt;Thank you, will try tomorrow.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sat, 26 Jul 2025 23:41:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Check-Point-API-example-mgmt-cli-in-bash-of-how-to-filter-using/m-p/254016#M9164</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-07-26T23:41:04Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point API example (mgmt_cli in bash) of how to filter using a string with spaces in it</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Check-Point-API-example-mgmt-cli-in-bash-of-how-to-filter-using/m-p/254028#M9165</link>
      <description>&lt;P&gt;Excellent, that worked!&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;[Expert@CP-MANAGEMENT:0]# mgmt_cli show threat-protections limit 25 offset 0 details-level "standard" filter "Cisco RV" -r true -f json | jq '.protections[] | ."name"'&lt;BR /&gt;"Cisco ACS Windows Bypass Authentication Unauthorized Access Ver2"&lt;BR /&gt;"Cisco Adaptive Security Appliance Buffer Overflow (CVE-2016-1287)"&lt;BR /&gt;"Cisco Adaptive Security Appliance Cross Site Scripting (CVE-2020-3580)"&lt;BR /&gt;"Cisco Adaptive Security Appliance Directory Traversal (CVE-2020-3452)"&lt;BR /&gt;"Cisco Adaptive Security Appliance Privilege Escalation (CVE-2016-6367)"&lt;BR /&gt;"Cisco Adaptive Security Appliance Privilege Escalation (CVE-2022-20759)"&lt;BR /&gt;"Cisco Adaptive Security Appliance Remote Code Execution (CVE-2018-0101)"&lt;BR /&gt;"Cisco Adaptive Security Appliance Web Services Denial of Service"&lt;BR /&gt;"Cisco AnyConnect Secure Mobility Client Privilege Escalation (CVE-2020-3153)"&lt;BR /&gt;"Cisco AnyConnect VPN Client ActiveX Code Execution"&lt;BR /&gt;"Cisco AnyConnect VPN Client Software Downgrade Code Execution"&lt;BR /&gt;"Cisco Application Networking Manager Default User Credentials Security Bypass"&lt;BR /&gt;"Cisco ASA Disable Password Remote Code Execution (CVE-2016-6366)"&lt;BR /&gt;"Cisco ASA VPN Portal Cross-Site Scripting"&lt;BR /&gt;"Cisco CNS Network Registrar Denial of Service"&lt;BR /&gt;"Cisco Collaboration Server Cross-Site Scripting (CVE-2010-0641)"&lt;BR /&gt;"Cisco Common Services Devices Center Cross Site Scripting"&lt;BR /&gt;"Cisco Common Services Framework Help Servlet Cross-Site Scripting"&lt;BR /&gt;"Cisco Data Center Network Manager Arbitrary File Deletion (CVE-2019-15981)"&lt;BR /&gt;"Cisco Data Center Network Manager Arbitrary File Upload"&lt;BR /&gt;"Cisco Data Center Network Manager Authentication Bypass (CVE-2019-15976)"&lt;BR /&gt;"Cisco Data Center Network Manager Command Injection"&lt;BR /&gt;"Cisco Data Center Network Manager Directory Traversal (CVE-2019-15980)"&lt;BR /&gt;"Cisco Data Center Network Manager SQL Injection (CVE-2019-15984)"&lt;BR /&gt;"Cisco Elastic Services Controller REST API Authentication Bypass (CVE-2019-1867)"&lt;BR /&gt;[Expert@CP-MANAGEMENT:0]#&lt;/P&gt;</description>
      <pubDate>Sun, 27 Jul 2025 13:58:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Check-Point-API-example-mgmt-cli-in-bash-of-how-to-filter-using/m-p/254028#M9165</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-07-27T13:58:44Z</dc:date>
    </item>
  </channel>
</rss>

