deprecated
Vulnerability Management: Deprecation of List Vulnerabilities Parameters
7 months ago by Levi Beverly
Tenable has deprecated the following List vulnerabilities query parameters:
age
authenticated
exploitable
resolvable
severity
This update affects the following endpoint:
API Endpoint | Name | Change |
---|---|---|
GET /workbenches/vulnerabilities | List vulnerabilities | Removed the age , authenticated , exploitable , resolvable , and severity query parameters. |
Tenable recommends that you update your integrations to use the following alternative custom workbench filters instead:
Query Parameter | Alternative Custom Filter |
---|---|
age | Use the following format to filter vulnerabilities by a specific age: filter.0.filter=plugin.attributes.vuln_publication_date&filter.0.quality=[date-lt, date-lte, date-gt, date-gte, date-eq, date-neq]&filter.0.value=[YYYY/MM/DD] For example, to filter vulnerabilities that are older than 2024/01/01, use the following filter: filter.0.filter=plugin.attributes.vuln_publication_date&filter.0.quality=date-lt&filter.0.value=2024/01/01 |
authenticated | You can use any combination of the following filters to filter vulnerabilities that require authentication. To filter for vulnerabilities with a local plugin type, use the following filter: filter.0.filter=plugin.attributes.plugin_type&filter.0.quality=eq&filter.0.value=local To filter for CVSSv2 vulnerabilities with local attack vectors, use the following filter: filter.0.filter=plugin.attributes.cvss_vector.raw&filter.0.quality=match&filter.0.value=AV:L To filter for CVSSv3 vulnerabilities with local attack vectors, use the following filter: filter.0.filter=plugin.attributes.cvss3_vector.raw&filter.0.quality=match&filter.0.value=AV:L To filter for both CVSSv2 and CVSSv3 vulnerabilities with local attack vectors, use the following filter: filter.0.filter=plugin.attributes.cvss_vector.raw&filter.0.quality=match&filter.0.value=AV:L&filter.1.filter=plugin.attributes.cvss3_vector.raw&filter.1.quality=match&filter.1.value=AV:L&filter.search_type=or |
exploitable | You can use any combination of the following filters to filter exploitable vulnerabilities. To filter for vulnerabilities that have an exploit available, use the following filter: filter.0.filter=plugin.attributes.exploit_available&filter.0.quality=eq&filter.0.value=true To filter for vulnerabilities that have an exploit available based on ease of exploitability, use the following filter: filter.0.filter=plugin.attributes.exploitability_ease.raw&filter.0.quality=eq&filter.0.value="Exploits are available" |
resolvable | No equivalent filter is available. |
severity | Use the following format to filter vulnerabilities by a specific severity: filter.0.filter=severity&filter.0.quality=[eq, neq]&filter.0.value=[Info, Low, Medium, High, Critical] For example, to filter vulnerabilities marked as critical severity, use the following filter: filter.0.filter=severity&filter.0.quality=eq&filter.0.value=Critical |
For more information about workbench filter parameters and formatting, see Workbench Filters.