List plugin outputs
GET {{baseUrl}}/workbenches/vulnerabilities/:plugin_id/outputs?date_range=67454373&filter.0.filter=?filter.0.filter=plugin.name&filter.0.quality=%26filter.0.quality=match&filter.0.value=%26filter.0.value=RHEL&filter.search_type=and
Retrieves the vulnerability outputs for a plugin. The list returned is limited to 5,000. To retrieve more than 5,000 vulnerability outputs, use the export-request API. Additionally, this endpoint only returns data less than 450 days (15 months) old.
Note: This endpoint is not intended for large or frequent exports of vulnerability or assets data. If you experience errors, reduce the volume, rate, or concurrency of your requests or narrow your filters. Contact support if you continue to experience errors. Additionally, Tenable recommends the POST /vulns/export endpoint for large or frequent exports of vulnerability data, and the POST /assets/export endpoint for large or frequent exports of assets data.
For information and best practices for retrieving vulnerability and assets data from Tenable.io, see Retrieve Vulnerability Data from Tenable.io and Retrieve Asset Data from Tenable.io.
Requires BASIC [16] user permissions. See Permissions.
Request Params
Key | Datatype | Required | Description |
---|---|---|---|
date_range | number | The number of days of data prior to and including today that should be returned. | |
filter.0.filter | string | The name of the filter to apply to the exported scan report. You can find available filters by using the GET /filters/workbenches/vulnerabilities endpoint. For more information about the format of this parameter, see Workbench Filters. | |
filter.0.quality | string | The operator of the filter to apply to the exported scan report. You can find the operators for the filter using the GET /filters/workbenches/vulnerabilities endpoint. For more information about the format of this parameter, see Workbench Filters. | |
filter.0.value | string | The value of the filter to apply to the exported scan report. You can find valid values for the filter in the 'control' attribute of the objects returned by the GET /filters/workbenches/vulnerabilities endpoint. For more information about the format of this parameter, see Workbench Filters. | |
filter.search_type | string | For multiple filters, specifies whether to use the AND or the OR logical operator. The default is AND. For more information about this parameter, see Workbench Filters. |
RESPONSES
status: OK
{"outputs":[{"plugin_output":"\nThe following certificate was at the top of the certificate\nchain sent by the remote host, but it is signed by an unknown\ncertificate authority :\n\n|-Subject : O=LCE Users/OU=LCE Certification Authority/L=New York/C=US/ST=NY/CN=LCE Certification Authority\n|-Issuer : O=LCE Users/OU=LCE Certification Authority/L=New York/C=US/ST=NY/CN=LCE Certification Authority\n","states":[{"name":"Active","results":[{"application_protocol":"unknown","port":1243,"transport_protocol":"tcp","assets":[{"hostname":"172.204.81.57","id":"484f06ae-c614-4a82-83f8-a8132b31ea37","uuid":"484f06ae-c614-4a82-83f8-a8132b31ea37","netbios_name":null,"fqdn":null,"ipv4":"172.204.81.57","first_seen":"2018-12-31T15:00:25Z","last_seen":"2018-12-31T15:00:25Z"},{"hostname":"172.204.81.57","id":"73261e87-8a1a-4644-9e99-d97feb3bdf48","uuid":"73261e87-8a1a-4644-9e99-d97feb3bdf48","netbios_name":null,"fqdn":null,"ipv4":"172.204.81.57","first_seen":"2018-12-31T15:00:25Z","last_seen":"2018-12-31T15:00:25Z"},{"hostname":"172.204.81.57","id":"9be6d0b1-33d2-4a29-86ea-69cd52642856","uuid":"9be6d0b1-33d2-4a29-86ea-69cd52642856","netbios_name":null,"fqdn":"benchlce2.dc.demo.io","ipv4":"172.204.81.57","first_seen":"2018-12-31T15:00:25Z","last_seen":"2018-12-31T15:00:25Z"},{"hostname":"172.204.81.57","id":"da2f6f2b-2a82-4fc4-865e-1a3d8b393b00","uuid":"da2f6f2b-2a82-4fc4-865e-1a3d8b393b00","netbios_name":null,"fqdn":null,"ipv4":"172.204.81.57","first_seen":"2018-12-31T15:00:25Z","last_seen":"2018-12-31T15:00:25Z"},{"hostname":"172.204.81.57","id":"eb970c99-08c4-4e44-ae5f-01f062b4349d","uuid":"eb970c99-08c4-4e44-ae5f-01f062b4349d","netbios_name":null,"fqdn":"centos7.dc.demo.io","ipv4":"172.204.81.57","first_seen":"2018-12-31T15:00:25Z","last_seen":"2018-12-31T15:00:25Z"},{"hostname":"172.204.81.57","id":"f228fdad-2f82-40c0-bb68-ad3ff2a8bebc","uuid":"f228fdad-2f82-40c0-bb68-ad3ff2a8bebc","netbios_name":null,"fqdn":null,"ipv4":"172.204.81.57","first_seen":"2018-12-31T15:00:25Z","last_seen":"2018-12-31T15:00:25Z"}],"severity":2}]}]},{"plugin_output":"\nThe following certificate was at the top of the certificate\nchain sent by the remote host, but it is signed by an unknown\ncertificate authority :\n\n|-Subject : O=VMware, Inc./OU=vCenterServer_2014.07.30_111246/CN=VMware default certificate/E=support@vmware.com\n|-Issuer : O=VMware, Inc./OU=vCenterServer_2014.07.30_111246/CN=172.204.81.57/E=support@vmware.com\n","states":[{"name":"Active","results":[{"application_protocol":"unknown","port":443,"transport_protocol":"tcp","assets":[{"hostname":"172.204.81.57","id":"7ee5f61c-e768-4dd7-baa6-f76381ca6970","uuid":"7ee5f61c-e768-4dd7-baa6-f76381ca6970","netbios_name":"VCENTER","fqdn":"vcenter.dc.demo.io","ipv4":"172.204.81.57","first_seen":"2018-12-31T15:00:25Z","last_seen":"2018-12-31T15:00:25Z"}],"severity":2},{"application_protocol":"unknown","port":8191,"transport_protocol":"tcp","assets":[{"hostname":"172.204.81.57","id":"7ee5f61c-e768-4dd7-baa6-f76381ca6970","uuid":"7ee5f61c-e768-4dd7-baa6-f76381ca6970","netbios_name":"VCENTER","fqdn":"vcenter.dc.demo.io","ipv4":"172.204.81.57","first_seen":"2018-12-31T15:00:25Z","last_seen":"2018-12-31T15:00:25Z"}],"severity":2},{"application_protocol":"unknown","port":8443,"transport_protocol":"tcp","assets":[{"hostname":"172.204.81.57","id":"7ee5f61c-e768-4dd7-baa6-f76381ca6970","uuid":"7ee5f61c-e768-4dd7-baa6-f76381ca6970","netbios_name":"VCENTER","fqdn":"vcenter.dc.demo.io","ipv4":"172.204.81.57","first_seen":"2018-12-31T15:00:25Z","last_seen":"2018-12-31T15:00:25Z"}],"severity":2},{"application_protocol":"unknown","port":31100,"transport_protocol":"tcp","assets":[{"hostname":"172.204.81.57","id":"7ee5f61c-e768-4dd7-baa6-f76381ca6970","uuid":"7ee5f61c-e768-4dd7-baa6-f76381ca6970","netbios_name":"VCENTER","fqdn":"vcenter.dc.demo.io","ipv4":"172.204.81.57","first_seen":"2018-12-31T15:00:25Z","last_seen":"2018-12-31T15:00:25Z"}],"severity":2},{"application_protocol":"unknown","port":32100,"transport_protocol":"tcp","assets":[{"hostname":"172.204.81.57","id":"7ee5f61c-e768-4dd7-baa6-f76381ca6970","uuid":"7ee5f61c-e768-4dd7-baa6-f76381ca6970","netbios_name":"VCENTER","fqdn":"vcenter.dc.demo.io","ipv4":"172.204.81.57","first_seen":"2018-12-31T15:00:25Z","last_seen":"2018-12-31T15:00:25Z"}],"severity":2}]}]},{"plugin_output":"\nThe following certificate was at the top of the certificate\nchain sent by the remote host, but it is signed by an unknown\ncertificate authority :\n\n|-Subject : CN=SSL_Self_Signed_Fallback\n|-Issuer : CN=SSL_Self_Signed_Fallback\n","states":[{"name":"Active","results":[{"application_protocol":"unknown","port":1433,"transport_protocol":"tcp","assets":[{"hostname":"172.204.81.57","id":"159295bd-0942-4ce6-aeb2-25aa7f161ba1","uuid":"159295bd-0942-4ce6-aeb2-25aa7f161ba1","netbios_name":"SQL2014","fqdn":"sql2014.dc.demo.io","ipv4":"172.204.81.57","first_seen":"2018-12-31T15:00:25Z","last_seen":"2018-12-31T15:00:25Z"},{"hostname":"172.204.81.57","id":"64cd2363-849f-46cb-88cf-df1b78511d9c","uuid":"64cd2363-849f-46cb-88cf-df1b78511d9c","netbios_name":"SCCMHOST","fqdn":"sccmhost.dc.demo.io","ipv4":"172.204.81.57","first_seen":"2018-12-31T15:00:25Z","last_seen":"2018-12-31T15:00:25Z"},{"hostname":"172.204.81.57","id":"ca66c0ad-3058-4abc-8173-040f622d9820","uuid":"ca66c0ad-3058-4abc-8173-040f622d9820","netbios_name":"SHAREPOINT2013","fqdn":"sharepoint2013.dc.demo.io","ipv4":"172.204.81.57","first_seen":"2018-12-31T15:00:25Z","last_seen":"2018-12-31T15:00:25Z"},{"hostname":"sql.ad.demo.io","id":"f674a95a-ec3d-4401-88c9-2eef4be82fa8","uuid":"f674a95a-ec3d-4401-88c9-2eef4be82fa8","netbios_name":"SQL","fqdn":"sql.ad.demo.io","ipv4":"172.204.81.57","first_seen":"2018-12-31T15:00:57Z","last_seen":"2018-12-31T15:00:57Z"}],"severity":2},{"application_protocol":"unknown","port":51361,"transport_protocol":"tcp","assets":[{"hostname":"172.204.81.57","id":"7ee5f61c-e768-4dd7-baa6-f76381ca6970","uuid":"7ee5f61c-e768-4dd7-baa6-f76381ca6970","netbios_name":"VCENTER","fqdn":"vcenter.dc.demo.io","ipv4":"172.204.81.57","first_seen":"2018-12-31T15:00:25Z","last_seen":"2018-12-31T15:00:25Z"}],"severity":2}]}]}]}