Integrations
- Integrations
- 1Password
- Abnormal
- Absolute
- AbuseIPDB
- Adaptive Shield
- Adobe Cloud
- ADP
- Agari Phishing Response
- Airlock
- Airlock Digital
- Akamai Identity Cloud Social
- Alert Logic
- AlgoSec Firewall Analyzer
- AlienVault OTX
- AlienVault USM
- Anodot
- Ansible
- Anvilogic
- Any Run
- Apex One
- ArcSight ESM
- Area 1
- Asana
- Asset Panda
- Atlassian User Management
- Atlassian User Provisioning
- auth0
- Authentik
- Authomize
- Automox
- AWS
- AWS IAM Identity Center
- Axonius
- Azure
- Azure Data Explorer
- Azure DevOps
- Azure Log Analytics
- Azure Storage
- BambooHR
- Big Fix
- BigPanda
- Bitbucket
- Bitdefender
- Bitsight
- Bitwarden
- Black Duck
- Black Kite
- Blink
- BMC Remedy
- Box
- Brinqa
- Cato Networks
- Censys
- Check Point Harmony
- Check Point Infinity Events
- Check Point XDR-XPR
- Check Point Management
- Checkmarx One
- Checkmarx SAST
- Chorus
- Chronicle
- Cisco Advanced Phishing Protection
- Cisco Domain Protection
- Cisco Meraki
- Cisco Talos
- Cisco Umbrella
- Cisco Webex
- Claroty xDome
- ClearPass
- ClickHouse
- ClickUp
- Cloud Custodian
- Cloudflare
- Cobalt
- Compass
- Confluence
- Confluence Data Center
- Coralogix
- Coralogix Incident Management
- Cortex XDR
- Cortex Xpanse
- CredStash
- Cribl
- CrowdStrike
- CyberArk
- Cybersixgill
- CyCognito
- Cyera
- Cylance
- Cyware CTIX
- Darktrace
- Dasera
- Databricks
- Datadog
- DataSet
- Delighted
- Delinea
- Devo
- Discord
- Docusign
- Domo
- Drata
- Dropbox
- Dropbox Business
- Druva
- Duo
- Duo Auth
- Dynatrace
- EasyVista
- EchoTrail
- Egnyte
- Egnyte Secure Govern
- Elasticsearch
- Entro
- Ermetic
- Exabeam
- Exchange Online
- Expel
- F5 BIG IP
- Falcon LogScale
- Falcon Surface
- Flare.io
- Forcepoint DLP
- Forescout
- FortiGate
- Freshservice
- GCP
- Ghostwriter
- Git
- GitHub
- GitLab
- Glean
- Gmail
- Google Calendar
- Google Chat
- Google Docs
- Google Drive
- Google Forms
- Google Looker
- Google Meet
- Google Sheets
- Google Workspace
- Grafana
- Grip Security
- GYTPOL
- Have I Been Pwned
- HiBob
- HubSpot
- Hunters
- Hybrid Analysis
- Hyperproof
- IBM Cloud
- IBM NS1 Connect
- IBM X Force
- Imperva
- incident.io
- Infoblox Cloud Services Portal
- Integrations
- Intercom
- Intezer
- IP API
- IPinfo
- IPWHOIS
- Ironscales
- Ivanti RiskSense
- Jamf
- JetBrains
- JFrog
- Jira
- Jira Data Center
- Joe Sandbox
- JumpCloud
- Kandji
- Keeper Secrets Manager
- Kenna Security
- KnowBe4
- KnowBe4 Events
- Kubernetes
- Lacework
- LaunchDarkly
- Linear
- Litmos
- LogicMonitor
- LogRhythm
- Manage Engine ServiceDesk Plus
- Mattermost
- Maven
- Microsoft Defender For Cloud
- Microsoft Defender For Cloud Apps
- Microsoft Defender For Endpoints
- Microsoft Defender XDR
- Microsoft E-Discovery
- Microsoft Entra ID
- Microsoft Graph
- Microsoft Intune
- Microsoft Office 365 Management Activity
- Microsoft Outlook
- Microsoft Purview
- Microsoft Sentinel
- Microsoft SQL Server
- Microsoft Teams
- Mimecast
- MISP
- Monday
- MongoDB Atlas
- MxToolbox
- Neo4j
- NetBox
- Netography
- Netskope
- New Relic
- Nightfall AI
- NinjaOne
- Notion
- Nozomi Networks
- Nuclei
- Nucleus
- Nutanix Hypervisor
- Obsidian
- Okta
- OneDrive
- OneLogin
- OneTrust
- OpenAI
- OpenCTI
- Opsgenie
- OPSWAT
- Oracle Cloud
- Oracle HCM
- Orca Security
- OWASP ZAP
- PagerDuty
- Palo Alto Cloud NGFW
- Palo Alto Firewall
- Panther
- Pentera
- Perception Point
- PhishLabs
- PhishLabs Incident Data
- PhishLabs Open Web Monitoring
- Pingdom
- PingID
- PingOne
- PlexTrac
- PortSwigger
- Postman
- Postman SCIM
- Power BI
- PowerShell
- Prisma Access
- Prisma Cloud CSPM
- Prisma Cloud CWP
- Prometheus
- Proofpoint
- Proofpoint ITM
- Proofpoint Protection Server
- Proofpoint Security Awareness Training
- Proofpoint TAP
- Proofpoint Threat Response Auto Pull
- Pub-Sub
- QRadar
- Qualys
- Rapid7
- Rapid7 InsightIDR
- Rapid7 InsightVM Cloud
- Rapid7 Threat Command
- Reco
- Recorded Future
- Red Hat IdM
- Rippling
- runZero
- SafeBase
- Sage HR
- SailPoint
- SailPoint IdentityIQ
- Salesforce
- SAP Ariba
- ScienceLogic
- Securin
- Securin VI
- SecurityScorecard
- Securonix
- SemGrep
- SentinelOne
- ServiceNow
- SharePoint
- Shodan
- Shopify
- Silverfort
- Slack
- Smartsheet
- Snipe-IT
- Snowflake
- Snyk
- SolarWinds Service Desk
- SonarQube
- Sophos
- Split
- Splunk
- Splunk Observability
- Splunk SOAR
- Spur
- StrongDM
- Sumo Logic
- Symantec EDR
- Sysdig
- Tableau
- Tanium
- TeamCity
- TeamViewer
- Telegram
- Tenable
- Tenable
- Actions
- Overview
- Agents List
- Bulk Add Agents
- Create An Agent Group
- Create Scan
- Download Asset Chunk
- Download Vulnerabilities Chunk
- Export Assets
- Export Vulnerabilities
- Get Asset Details
- Get Asset Export Status
- Get Network Details
- Get Scan Configuration Detail
- Get Scan Details
- Get Scan Vulnerabilities
- Get Vulnerabilities Export Status
- Get Vulnerability Details
- Get Web App Scan Details
- Import Assets
- Import Vulnerabilities
- Launch Scan
- List Agents Groups
- List Assets
- List Filters For Agents
- List Networks
- List Policies
- List Scan Configurations
- List Scan Vulnerabilities
- List Scans
- List Templates
- List Users
- Scanners List
- Tenable Custom Action
- Tenable Security Center
- Terraform
- Terraform Cloud
- TheHive
- Thinkst Canary
- ThreatQuotient
- Trellix Email Security
- Trello
- Trend Vision One
- Twilio
- UKG HR
- Uptycs
- URLScan
- Vault
- Veracode
- Verkada
- Vertica
- VirusTotal
- VMware Carbon Black
- VMware vSphere
- WeChat
- WhatsApp
- Whois
- WildFire
- Wiz
- Workday
- Workspace ONE UEM
- YesWeHack
- Zendesk
- Zero Networks
- Zoom
- Zscaler Internet Access
- Zscaler Private Access
Actions
List Scan Vulnerabilities
Returns a list of vulnerabilities detected by Tenable Web App Scanning API v2 scans.
To learn more, visit the Tenable documentation.
Parameters
Parameter | Description |
---|---|
Limit | The number of records to retrieve. If this parameter is omitted, Tenable.io uses the default value of 10 . The minimum value is 0 and the maximum value is 200 . If you need to retrieve more than 200 records, use the offset value to iterate through page responses. |
Offset | The starting record to retrieve. If this parameter is omitted, Tenable.io uses the default value of 0 . |
Sort | The field you want to use to sort the results by along with the sort order. The field is specified first, followed by a colon, and the order is specified second (asc or desc ). For example, name:desc would sort results by the name field in descending order.If you specify multiple fields, the fields must be separated by commas. For example, name:desc,created_at:asc would first sort results by the name field in descending order and then by the created_at field in ascending order. |
Example Output
{ "value": { "items": [ { "attachments": [ { "attachment_id": "cfde7d28-82f2-4733-b5d8-e003fc27a620", "attachment_name": "configuration.csv", "created_at": "2020-12-07T20:01:23.650014Z", "file_type": "text/plain", "md5": "md5:48be107f67f1cdc0e9d63a8f6cafc27e", "size": 2184 }, { "attachment_id": "23056170-5fcd-4b7c-9831-c62c94dd4b01", "attachment_name": "plugins.csv", "created_at": "2020-12-07T20:01:23.595659Z", "file_type": "text/plain", "md5": "md5:3ad245715cdb6856430dd1e71f7cb522", "size": 3236 } ], "created_at": "2020-12-07T20:01:19Z", "details": { "input_name": null, "input_type": null, "output": "\nEngine Version 1.8.0_DEVELOP_SNAPSHOT-1518\nScan ID 0d94f5b4-f811-44cb-802a-7f1c600818c3\n\nStart Time 2020-12-07 20:01:00 +0000\nDuration 00:00:17\n\nRequests 163\nRequests/s 19.6194\nMean Response Time 0.0917s\n\nBandwidth Usage\n- Data to Target 54.5 KB\n- Data from Target 43 KB\n\nTimeouts Encountered\nNetwork Timeouts 0\nBrowser Timeouts 0\n\n\nHTTP Protocols Detected\n- HTTP\n- HTTPs\n\n\nAuthentication Identified\n- None\n\n\nPlugins\n- 50 have been included per scan policy\n- 69 have been started based on target information collected\n\nList of plugins is available in 'plugins.csv' attachment.\n\n\nSettings used to conduct this scan are available in 'configuration.csv' attachment.\n", "payload": null, "proof": null, "request": null, "response": null, "selector": null, "selector_url": null, "signature": null }, "is_page": false, "plugin_id": 98000, "scan_id": "0d94f5b4-f811-44cb-802a-7f1c600818c3", "uri": "http://example.com/", "vuln_id": "240ae95d-3830-498e-8598-d44097ec64cf" }, { "attachments": [ { "attachment_id": "c4429383-fcb3-4b07-8a34-eb27c85f174f", "attachment_name": "technologies.csv", "created_at": "2020-12-07T20:01:23.451700Z", "file_type": "text/plain", "md5": "md5:aa89c953c21f31a1a7b01b3cafce50ab", "size": 254 } ], "created_at": "2020-12-07T20:01:19Z", "details": { "input_name": null, "input_type": null, "output": "The framework has detected the following technologies in the target application:\n\n- Bootstrap (version unknown)\n- Apache (v2.4.6)", "payload": null, "proof": null, "request": null, "response": null, "selector": null, "selector_url": null, "signature": null }, "is_page": false, "plugin_id": 98059, "scan_id": "0d94f5b4-f811-44cb-802a-7f1c600818c3", "uri": "http://example.com/", "vuln_id": "22713757-636a-415c-a9f8-1e09f2e071fc" }, { "attachments": [ { "attachment_id": "b9e19a4b-ca18-4322-8fcc-f8cc45b0310e", "attachment_name": "sitemap.csv", "created_at": "2020-12-07T20:01:23.509304Z", "file_type": "text/plain", "md5": "md5:7534a6027dfa163d99e12359bfbd033a", "size": 290 } ], "created_at": "2020-12-07T20:01:19Z", "details": { "input_name": null, "input_type": null, "output": "The scan has discovered 1 distinct URL.\n\nThe following is a breakdown of which URLs were audited:\n\n- 1 effectively audited\n\nFor URLs we received responses for, here is a distribution of the content type headers:\n\n- 1 text/html; charset=utf-8\n\nResponse times ranged between 0.156857s and 0.156857s.\n\nYou can access the complete list of URLs with the information collected by the scan as an attachment to this plugin.", "payload": null, "proof": null, "request": null, "response": null, "selector": null, "selector_url": null, "signature": null }, "is_page": false, "plugin_id": 98009, "scan_id": "0d94f5b4-f811-44cb-802a-7f1c600818c3", "uri": "http://example.com/", "vuln_id": "5dff45a8-efbb-4ec7-8f70-067ae81c87f2" } ], "pagination": { "limit": 3, "offset": 0, "sort": [ { "name": "created_at", "order": "desc" } ], "total": 632 } }}
Workflow Library Example
List Scan Vulnerabilities with Tenable and Send Results Via Email
Preview this Workflow on desktop
Was this page helpful?
Assistant
Responses are generated using AI and may contain mistakes.