Skip to main content

Export Vulnerabilities

Exports vulnerabilities that match the request criteria. Requires ADMINISTRATOR [64] user permissions.

External Documentation

To learn more, visit the Tenable documentation.

Basic Parameters

ParameterDescription
Filter By CIDR RangeRestricts search for vulnerabilities to assets assigned an IP address within the specified CIDR range. For example, 0.0.0.0/0 restricts the search to 0.0.0.1 and 255.255.255.254.
Filter By Network IDThe ID of the network object associated with scanners that detected the vulnerabilities you want to export. The default network ID is 00000000-0000-0000-0000-000000000000. To determine the ID of a custom network, use the GET /networks endpoint. For more information about network objects, see Manage Networks.
SeverityThe severity of the vulnerabilities to include in the export. Defaults to all severity levels. The severity of a vulnerability is defined using the Common Vulnerability Scoring System (CVSS) base score. Supported array values are:
- info—The vulnerability has a CVSS score of 0.
- low—The vulnerability has a CVSS score between 0.1 and 3.9.
- medium—The vulnerability has a CVSS score between 4.0 and 6.9.
- high—The vulnerability has a CVSS score between 7.0 and 9.9.
- critical—The vulnerability has a CVSS score of 10.0.

Advanced Parameters

ParameterDescription
Plugin TypeThe plugin type for which you want to filter the vulnerabilities returned in the vulnerability export. For example, remote, local, combined, etc. If your request omits this parameter, the export includes all vulnerabilities regardless of plugin type.

Example Output

{
"value": {
"export_uuid": "bf765455-53aa-4e70-9ef3-87cfca1d2be0"
}
}

Workflow Library Example

Export Vulnerabilities with Tenable and Send Results Via Email

Workflow LibraryPreview this Workflow on desktop