Tenable Security Center

Download 1
Last updated Feb 8, 2026

tenable-sc-vulnerability-details

Get vulnerability details from Tenable Security Center.

Syntax

tenable-sc-vulnerability-details [profile=PROFILE] [verify=VERIFY] [pretty=PRETTY]
profile=PROFILE
Optional. Connect profile code
verify=VERIFY
Optional. Verify profile (default: t). If f, returns empty on missing profile
pretty=PRETTY
Optional. Enable human-friendly output.

Output Fields

FieldTypeNameDescription
profileStringConnect Profilee.g. tenable_sc
repo_nameStringRepository Namee.g. Local
severityStringSeveritye.g. Info, Low, Medium, High, Critical
ipIP addressIP Addresse.g. 192.168.0.1
portIntegerPorte.g. 22 (0-65535)
protocolStringProtocole.g. ICMP, TCP, UDP
plugin_idStringPlugin IDe.g. 35291
plugin_nameStringPlugin Namee.g. SSL Certificate Signed Using Weak Hashing Algorithm
cveStringCVEe.g. CVE-2005-4900
vuln_publishedDateVulnerability Publishede.g. 2021-10-05 00:00:00
patch_publishedDatePatch Publishede.g. 2021-10-07 00:00:00
accept_riskStringAccept Riske.g. 0, 1
epss_scoreDoubleEPSS Scoree.g. 88.08 (0-100%, higher means more likely)
is_exploit_availableBoolExploit Availablee.g. true, false
exploit_easeStringExploit Easee.g. No exploit is required, Exploits are available
has_been_mitigatedBoolHas Been Mitigatede.g. true, false
synopsisStringSynopsise.g. It was possible to obtain traceroute information.
descriptionStringDescriptione.g. Makes a traceroute to the remote host.
solutionStringSolutione.g. Purchase or generate a proper SSL certificate for this service.
xrefStringCross Referencee.g. CWE #310, CERT #836068
referenceStringReferencee.g. http://www.nessus.org/u?9bb87bf2
plugin_textStringPlugin Texte.g. <plugin_output>Port 22/tcp was found to be open</plugin_output>
hostnameStringHostnamee.g. appletv.dc.demo.io
os_nameStringOperating Systeme.g. Alcatel-Lucent Appliance
vpr_scoreDoubleVPR Scoree.g. 6.7 (0.1-10.0, higher means more critical)
vpr_contextStringVPR Contexte.g. Array of objects with id, type, name, value keys
acr_scoreDoubleACR Scoree.g. 5 (1-10, higher means more critical)
acr_key_driversMapACR Key Driverse.g. {device_type: general_server}
asset_exposure_scoreDoubleAsset Exposure Scoree.g. 408 (0-1000, higher means more exposed)
first_seenDateFirst Seene.g. 2024-01-15 10:30:00
last_seenDateLast Seene.g. 2024-12-01 14:20:00
cvss_v2_base_scoreDoubleCVSS v2 Base Scoree.g. 5.0 (0-10.0)
cvss_v2_temporal_scoreDoubleCVSS v2 Temporal Scoree.g. 3.9 (0-10.0)
cvss_v2_vectorStringCVSS v2 Vectore.g. AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:OF/RC:C
cvss_v3_base_scoreDoubleCVSS v3 Base Scoree.g. 7.5 (0-10.0)
cvss_v3_temporal_scoreDoubleCVSS v3 Temporal Scoree.g. 6.7 (0-10.0)
cvss_v3_vectorStringCVSS v3 Vectore.g. AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C
cvss_v4_base_scoreDoubleCVSS v4 Base Scoree.g. 8.0 (0-10.0)
cvss_v4_threat_scoreDoubleCVSS v4 Threat Scoree.g. 6.0 (0-10.0)
cvss_v4_supplementalStringCVSS v4 Supplementale.g. S:N/AU:N/R:A/V:D/RE:L/U:Clear
cvss_v4_vectorStringCVSS v4 Vectore.g. AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
cvss_v4_threat_vectorStringCVSS v4 Threat Vectore.g. E:P
plugin_publishedDatePlugin Publishede.g. 2009-01-15 00:00:00
plugin_updatedDatePlugin Updatede.g. 2024-12-01 00:00:00
plugin_family_typeStringPlugin Family Typee.g. active
plugin_family_nameStringPlugin Family Namee.g. General, Windows, Web Servers
plugin_versionStringPlugin Versione.g. 1.25
check_typeStringCheck Typee.g. remote
cpeStringCPEe.g. cpe:/a:ietf:x.509_certificate
severity_idIntegerSeverity IDe.g. 0, 1, 2, 3, 4
bugtraq_idStringBugtraq IDe.g. 11849, 33065
exploit_frameworksStringExploit Frameworkse.g. Core Impact, Metasploit