TOC & Recently Viewed

Recently Viewed Topics

Download Vulnerability Export Chunks

User Permissions: Administrator (64)

To download available export chunks, use the API endpoint described below.

HTTP Request

Note: To authenticate your request, be sure to include API keys in the HTTP header of the request. For more information, see Authorization.

Request Path Syntax

GET https://cloud.tenable.com/vulns/export/{export_uuid}/chunks/{chunk_id}

Request Path Parameters

Parameter Type Description Required
export_uuid string The UUID of the export request. required
chunk_id integer The ID of the asset chunk you want to export. required

Request Path Example

GET https://cloud.tenable.com/vulns/export/a483adf8-24e3-4c7f-818a-6867b02310dd/chunks/1

Request Body Syntax

None.

HTTP Response

Response Codes

Status Description
200 Returned if the file is downloaded successfully. For more information, see "Response Body Syntax."
400 Returned if the chunk ID is invalid or the chunk is not ready for download.
403 Returned if you do not have permission to export vulnerabilities.
404 Returned if a chunk with the specified export chunk is not found.
429

Returned if you attempt to send too many requests in a specific period of time. For more information, see Rate Limiting.

Response Body Syntax

Note: The response attributes listed below represent all available attributes. The API response body excludes an attribute if the attribute is empty in the vulnerability record. For a description of the attributes, see Vulnerability Export Attributes.

{ "asset": [ "agent_uuid": {string}, "bios_uuid": {string}, "device_type": {string}, "fqdn": {string}, "hostname": {string}, "uuid": {string}, "ipv4": {string}, "ipv6": {string}, "last_authenticated_results": {string}, "last_unauthenticated_results": {string}, "mac_address": {string}, "netbios_name": {string}, "netbios_workgroup": {string}, "operating_system": {string}, "tracked": {string}, ], "output": {string}, "plugin": [ "bid": {string}, "canvas_package": {string}, "checks_for_default_account": {string}, "checks_for_malware": {string}, "cpe": {string}, "cve": {string}, "cvss3_base_score": {string}, "cvss3_temporal_score": {string}, "cvss3_temporal_vector": { "Exploitability": {string}, "RemediationLevel": {string}, "ReportConfidence": {string}, }, "cvss3_vector": { "AccessComplexity": {string}, "AccessVector": {string}, "Authentication": {string}, "Availability-Impact": {string}, "Confidentiality-Impact": {string}, "Integrity-Impact": {string}, }, "cvss_base_score": {string}, "cvss_temporal_score": {string}, "cvss_temporal_vector": { "Exploitability": {string}, "RemediationLevel": {string}, "ReportConfidence": {string}, }, "cvss_vector": { "AccessComplexity": {string}, "AccessVector": {string}, "Authentication": {string}, "Availability-Impact": {string}, "Confidentiality-Impact": {string}, "Integrity-Impact": {string}, }, "d2_elliot_name": {string}, "description": {string}, "exploit_available": {string}, "exploit_framework_canvas": {string}, "exploit_framework_core": {string}, "exploit_framework_d2_elliot": {string}, "exploit_framework_exploithub": {string}, "exploit_framework_metasploit": {string}, "exploitability_ease": {string}, "exploited_by_malware": {string}, "exploited_by_nessus": {string}, "exploithub_sku": {string}, "family": {string}, "family_id": {string}, "has_patch": {string}, "id": {string}, "in_the_news": {string}, "metasploit_name": {string}, "ms_bulletin": {string}, "name": {string}, "patch_publication_date": {string}, "modification_date": {string}, "publication_date": {string}, "risk_factor": {string}, "see_also": {string}, "solution": {string}, "stig_severity": {string}, "synopsis": {string}, "type": {string}, "unsupported_by_vendor": {string}, "usn": {string}, "version": {string}, "vuln_publication_date": {string}, "xrefs": {string}, ], "port": [ "port": {string}, "protocol": {string}, "service": {string}, ], "recast_reason": {string}, "recast_rule_uuid": {string}, "scan": [ "completed_at": {string}, "schedule_uuid": {string}, "started_at": {string}, "uuid": {string}, ], "severity": {string}, "severity_id": {string}, "severity_default_id": {string}, "severity_modification_type": {string}, "first_found": {string}, "last_fixed": {string}, "last_found": {string}, "state": {string}, }

Response Body Attributes

See Vulnerability Export Attributes.

Response Body Example

[ { "asset": { "fqdn":"example.com", "hostname":"172.106.217.225", "uuid":"150dee8f-6090-4a9c-907c-54a1c39ddab0", "ipv4":"172.156.65.8", "operating_system":["Apple Mac OS X 10.5.8"], "tracked":true }, "output":"The observed version of Google Chrome is : \n Chrome/21.0.1180.90", "plugin":{ "cve":[ "CVE-2016-1620", "CVE-2016-1614", "CVE-2016-1613", "CVE-2016-1612", "CVE-2016-1618", "CVE-2016-1617", "CVE-2016-1616", "CVE-2016-1615", "CVE-2016-1619" ], "cvss_base_score":9.3, "cvss_temporal_score":6.9, "cvss_temporal_vector":{ "exploitability": "Unproven", "remediation_level":"Official-fix", "report_confidence":"Confirmed", "raw":"E:U/RL:OF/RC:C" }, "cvss_vector":{ "access_complexity":"Medium", "access_vector":"Network", "authentication":"None required", "availability_impact":"Complete", "confidentiality_impact":"Complete", "integrity_impact":"Complete","raw":"AV:N/AC:M/Au:N/C:C/I:C/A:C" }, "description":"The version of Google Chrome on the remote host is prior to 48.0.2564.82 and is affected by the following vulnerabilities :\n\n - An unspecified vulnerability exists in Google V8 when handling compatible receiver checks hidden behind receptors. An attacker can exploit this to have an unspecified impact. No other details are available. (CVE-2016-1612)\n - A use-after-free error exists in 'PDFium' due to improper invalidation of 'IPWL_FocusHandler' and 'IPWL_Provider' upon destruction. An attacker can exploit this to dereference already freed memory, resulting in the execution of arbitrary code. (CVE-2016-1613)\n - An unspecified vulnerability exists in 'Blink' that is related to the handling of bitmaps. An attacker can exploit this to access sensitive information. No other details are available. (CVE-2016-1614)\n - An unspecified vulnerability exists in 'omnibox' that is related to origin confusion. An attacker can exploit this to have an unspecified impact. No other details are available. (CVE-2016-1615)\n - An unspecified vulnerability exists that allows an attacker to spoof a displayed URL. No other details are available. (CVE-2016-1616)\n - An unspecified vulnerability exists that is related to history sniffing with HSTS and CSP. No other details are available. (CVE-2016-1617)\n - A flaw exists in 'Blink' due to the weak generation of random numbers by the ARC4-based random number generator. An attacker can exploit this to gain access to sensitive information. No other details are available. (CVE-2016-1618)\n - An out-of-bounds read error exists in 'PDFium' in file 'fx_codec_jpx_opj.cpp' in the 'sycc4{22,44}_to_rgb()' functions. An attacker can exploit this to cause a denial of service by crashing the application linked using the library. (CVE-2016-1619)\n - Multiple vulnerabilities exist, the most serious of which allow an attacker to execute arbitrary code via a crafted web page. (CVE-2016-1620)\n - A flaw in 'objects.cc' is triggered when handling cleared 'WeakCells', which may allow a context-dependent attacker to have an unspecified impact. No further details have been provided. (CVE-2016-2051)", "family":"Web Clients", "family_id":1000020, "has_patch":false, "id":9062, "name":"Google Chrome < 48.0.2564.82 Multiple Vulnerabilities", "risk_factor":"HIGH", "see_also": [ "http://googlechromereleases.blogspot.com/2016/01/beta-channel-update_20.html" ], "solution":"Update the Chrome browser to 48.0.2564.82 or later.", "synopsis":"The remote host is utilizing a web browser that is affected by multiple vulnerabilities." }, "port":{ "port":0, "protocol":"TCP" }, "scan":{ "completed_at":"2018-05-23T20:59:47Z", "schedule_uuid":"413765fb-e941-7eea-ca8b-0a79182a2806e1b6640fe8a2217b", "started_at":"2018-05-23T20:59:47Z", "uuid":"e2c070ae-ec37-d9ff-f003-2e89b7e5e1ab8af3a9957a077904" }, "severity":"high", "severity_id":3, "severity_default_id":3, "severity_modification_type":"NONE", "first_found":"2018-05-23T20:59:47Z", "last_found":"2018-05-23T20:59:47Z", "state":"OPEN" }, {"asset": ... } ]

Reference Guide

https://cloud.tenable.com/api#/resources/exports/vulns-download-chunk

Examples

Copyright 2017 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.