Rapid7 Insight VM
Version: 1.0.0
InsightVM is a data-rich resource that can amplify the other solutions in your tech stack, from SIEMs and firewalls to ticketing systems.
Connect Rapid7 Insight VM with Logichub
- Navigate to Automations > Integrations.
- Search for Rapid7 Insight VM.
- Click Details, then the + icon. Enter the required information in the following fields.
- Label: Connection name.
- Reference Values: Define variables here to templatize integration connections and actions. For example, you can use https://www.{{hostname}}.com where, hostname is a variable defined in this input. For more information on how to add data, see 'Add Data' Input Type for Integrations.
- Verify SSL: Select option to verify connecting server's SSL certificate (Default is Verify SSL Certificate).
- Base URL: Base URL (Example 'https://us.api.knowbe4.com' or 'https://eu.api.knowbe4.com' without quotes).
- Username: Username
- Password: Password for provided user.
- Token: Token to leverage two-factor authentication. Note: This must be enabled on the console and be configured for the account accessing the API.
- After you've entered all the details, click Connect.
Actions for Rapid7 Insight VM
List Assets
Returns all assets for which you have access
Input Field
Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.
Input Name | Description | Required |
---|---|---|
Limit | Jinja-templated text containing the limit of records to fetch (Default is 100). | Optional |
Explode Results | Explode each result in a separate row. (Default is No) | Optional |
Output
JSON containing the following items:
{
"result": {
"links": [
{
"href": "https://hostname:3780/api/3/...",
"rel": "self"
}
],
"page": {
"number": 6,
"size": 10,
"totalPages": 13,
"totalResources": 123
},
"resources": [
{
"addresses": [
{
"ip": "123.245.34.235",
"mac": "12:34:56:78:90:AB"
}
],
"assessedForPolicies": false,
"assessedForVulnerabilities": true,
"configurations": [
{
"name": "<name>",
"value": "<value>"
}
],
"databases": [
{
"description": "Microsoft SQL Server",
"id": 13,
"name": "MSSQL"
}
],
"files": [
{
"attributes": [
{
"name": "<name>",
"value": "<value>"
}
],
"name": "ADMIN$",
"size": -1,
"type": "directory"
}
],
"history": [
{
"date": "2018-04-09T06:23:49Z",
"description": "",
"scanId": 12,
"type": "SCAN",
"user": "",
"version": 8,
"vulnerabilityExceptionId": ""
}
],
"hostName": "corporate-workstation-1102DC.acme.com",
"hostNames": [
{
"name": "corporate-workstation-1102DC.acme.com",
"source": "DNS"
}
],
"id": 282,
"ids": [
{
"id": "c56b2c59-4e9b-4b89-85e2-13f8146eb071",
"source": "WQL"
}
],
"ip": "182.34.74.202",
"links": [
{
"href": "https://hostname:3780/api/3/...",
"rel": "self"
}
],
"mac": "AB:12:CD:34:EF:56",
"os": "Microsoft Windows Server 2008 Enterprise Edition SP1",
"osCertainty": "0.75",
"osFingerprint": {
"architecture": "x86",
"configurations": [
{
"name": "<name>",
"value": "<value>"
}
],
"cpe": {
"edition": "enterprise",
"language": "",
"other": "",
"part": "o",
"product": "windows_server_2008",
"swEdition": "",
"targetHW": "",
"targetSW": "",
"update": "sp1",
"v2.2": "cpe:/o:microsoft:windows_server_2008:-:sp1:enterprise",
"v2.3": "cpe:2.3:o:microsoft:windows_server_2008:-:sp1:enterprise:*:*:*:*:*",
"vendor": "microsoft",
"version": "-"
},
"description": "Microsoft Windows Server 2008 Enterprise Edition SP1",
"family": "Windows",
"id": 35,
"product": "Windows Server 2008 Enterprise Edition",
"systemName": "Microsoft Windows",
"type": "Workstation",
"vendor": "Microsoft",
"version": "SP1"
},
"rawRiskScore": 31214.3,
"riskScore": 37457.16,
"services": [
{
"configurations": [
{
"name": "<name>",
"value": "<value>"
}
],
"databases": [
{
"description": "Microsoft SQL Server",
"id": 13,
"name": "MSSQL"
}
],
"family": "",
"links": [
{
"href": "https://hostname:3780/api/3/...",
"rel": "self"
}
],
"name": "CIFS Name Service",
"port": 139,
"product": "Samba",
"protocol": "tcp",
"userGroups": [
{
"id": 972,
"name": "Administrators"
}
],
"users": [
{
"fullName": "Smith, John",
"id": 8952,
"name": "john_smith"
}
],
"vendor": "",
"version": "3.5.11",
"webApplications": [
{
"id": 30712,
"pages": [
{
"linkType": "html-ref",
"path": "/docs/config/index.html",
"response": 200
}
],
"root": "/",
"virtualHost": "102.89.22.253"
}
]
}
],
"software": [
{
"configurations": [
{
"name": "<name>",
"value": "<value>"
}
],
"cpe": {
"edition": "enterprise",
"language": "",
"other": "",
"part": "o",
"product": "windows_server_2008",
"swEdition": "",
"targetHW": "",
"targetSW": "",
"update": "sp1",
"v2.2": "cpe:/o:microsoft:windows_server_2008:-:sp1:enterprise",
"v2.3": "cpe:2.3:o:microsoft:windows_server_2008:-:sp1:enterprise:*:*:*:*:*",
"vendor": "microsoft",
"version": "-"
},
"description": "Microsoft Outlook 2013 15.0.4867.1000",
"family": "Office 2013",
"id": 0,
"product": "Outlook 2013",
"type": "Productivity",
"vendor": "Microsoft",
"version": "15.0.4867.1000"
}
],
"type": "",
"userGroups": [
{
"id": 972,
"name": "Administrators"
}
],
"users": [
{
"fullName": "Smith, John",
"id": 8952,
"name": "john_smith"
}
],
"vulnerabilities": {
"critical": 16,
"exploits": 4,
"malwareKits": 0,
"moderate": 3,
"severe": 76,
"total": 95
}
}
]
},
"error": null,
"has_error":false,
}
Search Assets
Returns all assets for which you have access that match the given search criteria.
Input Field
Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.
Input Name | Description | Required |
---|---|---|
Search Query | Jinja-templated JSON containing the search query. Example: {"filters": [{"field": "","lower": "","operator": "","upper": "","value": "","values": [{}]}],"match": "all"} | Required |
Limit | Jinja-templated text containing the limit of records to fetch (Default is 100). | Optional |
Explode Results | Explode each result in a separate row. (Default is No) | Optional |
Output
JSON containing the following items:
{
"result": {
"links": [
{
"href": "https://hostname:3780/api/3/...",
"rel": "self"
}
],
"page": {
"number": 6,
"size": 10,
"totalPages": 13,
"totalResources": 123
},
"resources": [
{
"addresses": [
{
"ip": "123.245.34.235",
"mac": "12:34:56:78:90:AB"
}
],
"assessedForPolicies": false,
"assessedForVulnerabilities": true,
"configurations": [
{
"name": "<name>",
"value": "<value>"
}
],
"databases": [
{
"description": "Microsoft SQL Server",
"id": 13,
"name": "MSSQL"
}
],
"files": [
{
"attributes": [
{
"name": "<name>",
"value": "<value>"
}
],
"name": "ADMIN$",
"size": -1,
"type": "directory"
}
],
"history": [
{
"date": "2018-04-09T06:23:49Z",
"description": "",
"scanId": 12,
"type": "SCAN",
"user": "",
"version": 8,
"vulnerabilityExceptionId": ""
}
],
"hostName": "corporate-workstation-1102DC.acme.com",
"hostNames": [
{
"name": "corporate-workstation-1102DC.acme.com",
"source": "DNS"
}
],
"id": 282,
"ids": [
{
"id": "c56b2c59-4e9b-4b89-85e2-13f8146eb071",
"source": "WQL"
}
],
"ip": "182.34.74.202",
"links": [
{
"href": "https://hostname:3780/api/3/...",
"rel": "self"
}
],
"mac": "AB:12:CD:34:EF:56",
"os": "Microsoft Windows Server 2008 Enterprise Edition SP1",
"osCertainty": "0.75",
"osFingerprint": {
"architecture": "x86",
"configurations": [
{
"name": "<name>",
"value": "<value>"
}
],
"cpe": {
"edition": "enterprise",
"language": "",
"other": "",
"part": "o",
"product": "windows_server_2008",
"swEdition": "",
"targetHW": "",
"targetSW": "",
"update": "sp1",
"v2.2": "cpe:/o:microsoft:windows_server_2008:-:sp1:enterprise",
"v2.3": "cpe:2.3:o:microsoft:windows_server_2008:-:sp1:enterprise:*:*:*:*:*",
"vendor": "microsoft",
"version": "-"
},
"description": "Microsoft Windows Server 2008 Enterprise Edition SP1",
"family": "Windows",
"id": 35,
"product": "Windows Server 2008 Enterprise Edition",
"systemName": "Microsoft Windows",
"type": "Workstation",
"vendor": "Microsoft",
"version": "SP1"
},
"rawRiskScore": 31214.3,
"riskScore": 37457.16,
"services": [
{
"configurations": [
{
"name": "<name>",
"value": "<value>"
}
],
"databases": [
{
"description": "Microsoft SQL Server",
"id": 13,
"name": "MSSQL"
}
],
"family": "",
"links": [
{
"href": "https://hostname:3780/api/3/...",
"rel": "self"
}
],
"name": "CIFS Name Service",
"port": 139,
"product": "Samba",
"protocol": "tcp",
"userGroups": [
{
"id": 972,
"name": "Administrators"
}
],
"users": [
{
"fullName": "Smith, John",
"id": 8952,
"name": "john_smith"
}
],
"vendor": "",
"version": "3.5.11",
"webApplications": [
{
"id": 30712,
"pages": [
{
"linkType": "html-ref",
"path": "/docs/config/index.html",
"response": 200
}
],
"root": "/",
"virtualHost": "102.89.22.253"
}
]
}
],
"software": [
{
"configurations": [
{
"name": "<name>",
"value": "<value>"
}
],
"cpe": {
"edition": "enterprise",
"language": "",
"other": "",
"part": "o",
"product": "windows_server_2008",
"swEdition": "",
"targetHW": "",
"targetSW": "",
"update": "sp1",
"v2.2": "cpe:/o:microsoft:windows_server_2008:-:sp1:enterprise",
"v2.3": "cpe:2.3:o:microsoft:windows_server_2008:-:sp1:enterprise:*:*:*:*:*",
"vendor": "microsoft",
"version": "-"
},
"description": "Microsoft Outlook 2013 15.0.4867.1000",
"family": "Office 2013",
"id": 0,
"product": "Outlook 2013",
"type": "Productivity",
"vendor": "Microsoft",
"version": "15.0.4867.1000"
}
],
"type": "",
"userGroups": [
{
"id": 972,
"name": "Administrators"
}
],
"users": [
{
"fullName": "Smith, John",
"id": 8952,
"name": "john_smith"
}
],
"vulnerabilities": {
"critical": 16,
"exploits": 4,
"malwareKits": 0,
"moderate": 3,
"severe": 76,
"total": 95
}
}
]
},
"error": null,
"has_error":false,
}
List Asset Groups
Returns all asset groups.
Input Field
Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.
Input Name | Description | Required |
---|---|---|
Name | Jinja-templated text containing the search pattern for the name of the asset group. Searches are case-insensitive. | Optional |
Type | Jinja-templated text containing the type of asset group. | Optional |
Limit | Jinja-templated text containing the limit of records to fetch (Default is 100). | Optional |
Explode Results | Explode each result in a separate row. (Default is No) | Optional |
Output
JSON containing the following items:
{
"result": {
"assets": 768,
"description": "Assets with unacceptable high risk required immediate remediation.",
"id": 61,
"links": [
{
"href": "https://hostname:3780/api/3/...",
"rel": "self"
}
],
"name": "High Risk Assets",
"riskScore": 4457823.78,
"searchCriteria": {
"filters": [
{
"field": "",
"lower": "",
"operator": "",
"upper": "",
"value": "",
"values": [
{}
]
}
],
"match": "all"
},
"type": "dynamic",
"vulnerabilities": {
"critical": 16,
"moderate": 3,
"severe": 76,
"total": 95
}
},
"error": null,
"has_error":false,
}
List Tags
Returns all tags.
Input Field
Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.
Input Name | Description | Required |
---|---|---|
Name | Jinja-templated text containing the search pattern for the name of the tags. Searches are case-insensitive. | Optional |
Type | Jinja-templated text containing the type of tag. | Optional |
Limit | Jinja-templated text containing the limit of records to fetch (Default is 100). | Optional |
Explode Results | Explode each result in a separate row. (Default is No) | Optional |
Output
JSON containing the following items:
{
"result": {
"color": "default",
"created": "2017-10-07T23:50:01.205Z",
"id": 6,
"links": [
{
"href": "https://hostname:3780/api/3/...",
"rel": "self"
}
],
"name": "My Custom Tag",
"riskModifier": 2,
"searchCriteria": {
"filters": [
{
"field": "",
"lower": "",
"operator": "",
"upper": "",
"value": "",
"values": [
{}
]
}
],
"match": "all"
},
"source": "custom",
"type": "custom"
},
"error": null,
"has_error":false,
}
List Vulnerabilities
Returns all vulnerabilities that can be assessed during a scan.
Input Field
Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.
Input Name | Description | Required |
---|---|---|
Limit | Jinja-templated text containing the limit of records to fetch (Default is 100). | Optional |
Explode Results | Explode each result in a separate row. (Default is No) | Optional |
Output
JSON containing the following items:
{
"result": {
"added": "2017-10-10",
"categories": [
"string"
],
"cves": [
"string"
],
"cvss": {
"links": [
{
"href": "https://hostname:3780/api/3/...",
"rel": "self"
}
],
"v2": {
"accessComplexity": "M",
"accessVector": "L",
"authentication": "N",
"availabilityImpact": "P",
"confidentialityImpact": "P",
"exploitScore": 3.3926,
"impactScore": 6.443,
"integrityImpact": "P",
"score": 4.4,
"vector": "AV:L/AC:M/Au:N/C:P/I:P/A:P"
},
"v3": {
"attackComplexity": "H",
"attackVector": "N",
"availabilityImpact": "H",
"confidentialityImpact": "H",
"exploitScore": 1.6201,
"impactScore": 5.8731,
"integrityImpact": "H",
"privilegeRequired": "N",
"scope": "U",
"score": 7.5,
"userInteraction": "R",
"vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
},
"denialOfService": false,
"description": {
"html": "A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. ...",
"text": "<p>A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. ...</p>"
},
"exploits": "",
"id": "msft-cve-2017-11804",
"links": [
{
"href": "https://hostname:3780/api/3/...",
"rel": "self"
}
],
"malwareKits": "",
"modified": "2017-10-10",
"pci": {
"adjustedCVSSScore": 4,
"adjustedSeverityScore": 3,
"fail": true,
"specialNotes": "",
"status": "Fail"
},
"published": "2017-10-10",
"riskScore": 123.69,
"severity": "Severe",
"severityScore": 4,
"title": "Microsoft CVE-2017-11804: Scripting Engine Memory Corruption Vulnerability"
},
"error": null,
"has_error":false,
}
List Vulnerabilities Exception
Returns all exceptions defined on vulnerabilities.
Input Field
Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.
Input Name | Description | Required |
---|---|---|
Limit | Jinja-templated text containing the limit of records to fetch (Default is 100). | Optional |
Explode Results | Explode each result in a separate row. (Default is No) | Optional |
Output
JSON containing the following items:
{
"result": {
"expires": "",
"id": "",
"links": [
{
"href": "https://hostname:3780/api/3/...",
"rel": "self"
}
],
"review": {
"comment": "",
"date": "",
"links": [
{
"href": "https://hostname:3780/api/3/...",
"rel": "self"
}
],
"name": "",
"user": ""
},
"scope": {
"id": "",
"key": "",
"links": [
{
"href": "https://hostname:3780/api/3/...",
"rel": "self"
}
],
"port": "",
"type": "",
"vulnerability": ""
},
"state": "",
"submit": {
"comment": "",
"date": "",
"links": [
{
"href": "https://hostname:3780/api/3/...",
"rel": "self"
}
],
"name": "",
"reason": "",
"user": ""
}
},
"error": null,
"has_error":false,
}
List Sites
Retrieves a paged resource of accessible sites.
Input Field
Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.
Input Name | Description | Required |
---|---|---|
Limit | Jinja-templated text containing the limit of records to fetch (Default is 100). | Optional |
Explode Results | Explode each result in a separate row. (Default is No) | Optional |
Output
JSON containing the following items:
{
"result": {
"assets": 768,
"connectionType": "",
"description": "",
"id": "",
"importance": "",
"lastScanTime": "",
"links": [
{
"href": "https://hostname:3780/api/3/...",
"rel": "self"
}
],
"name": "",
"riskScore": 4457823.78,
"scanEngine": "",
"scanTemplate": "",
"type": "",
"vulnerabilities": {
"critical": 16,
"moderate": 3,
"severe": 76,
"total": 95
}
},
"error": null,
"has_error":false,
}
List Sites Assets
Retrieves a paged resource of assets linked with the specified site.
Input Field
Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.
Input Name | Description | Required |
---|---|---|
Site Id | Jinja-templated text containing the site Id | Required |
Limit | Jinja-templated text containing the limit of records to fetch (Default is 100). | Optional |
Explode Results | Explode each result in a separate row. (Default is No) | Optional |
Output
JSON containing the following items:
{
"result": {
"addresses": [
{
"ip": "123.245.34.235",
"mac": "12:34:56:78:90:AB"
}
],
"assessedForPolicies": false,
"assessedForVulnerabilities": true,
"configurations": [
{
"name": "<name>",
"value": "<value>"
}
],
"databases": [
{
"description": "Microsoft SQL Server",
"id": 13,
"name": "MSSQL"
}
],
"files": [
{
"attributes": [
{
"name": "<name>",
"value": "<value>"
}
],
"name": "ADMIN$",
"size": -1,
"type": "directory"
}
],
"history": [
{
"date": "2018-04-09T06:23:49Z",
"description": "",
"scanId": 12,
"type": "SCAN",
"user": "",
"version": 8,
"vulnerabilityExceptionId": ""
}
],
"hostName": "corporate-workstation-1102DC.acme.com",
"hostNames": [
{
"name": "corporate-workstation-1102DC.acme.com",
"source": "DNS"
}
],
"id": 282,
"ids": [
{
"id": "c56b2c59-4e9b-4b89-85e2-13f8146eb071",
"source": "WQL"
}
],
"ip": "182.34.74.202",
"links": [
{
"href": "https://hostname:3780/api/3/...",
"rel": "self"
}
],
"mac": "AB:12:CD:34:EF:56",
"os": "Microsoft Windows Server 2008 Enterprise Edition SP1",
"osCertainty": "0.75",
"osFingerprint": {
"architecture": "x86",
"configurations": [
{
"name": "<name>",
"value": "<value>"
}
],
"cpe": {
"edition": "enterprise",
"language": "",
"other": "",
"part": "o",
"product": "windows_server_2008",
"swEdition": "",
"targetHW": "",
"targetSW": "",
"update": "sp1",
"v2.2": "cpe:/o:microsoft:windows_server_2008:-:sp1:enterprise",
"v2.3": "cpe:2.3:o:microsoft:windows_server_2008:-:sp1:enterprise:*:*:*:*:*",
"vendor": "microsoft",
"version": "-"
},
"description": "Microsoft Windows Server 2008 Enterprise Edition SP1",
"family": "Windows",
"id": 35,
"product": "Windows Server 2008 Enterprise Edition",
"systemName": "Microsoft Windows",
"type": "Workstation",
"vendor": "Microsoft",
"version": "SP1"
},
"rawRiskScore": 31214.3,
"riskScore": 37457.16,
"services": [
{
"configurations": [
{
"name": "<name>",
"value": "<value>"
}
],
"databases": [
{
"description": "Microsoft SQL Server",
"id": 13,
"name": "MSSQL"
}
],
"family": "",
"links": [
{
"href": "https://hostname:3780/api/3/...",
"rel": "self"
}
],
"name": "CIFS Name Service",
"port": 139,
"product": "Samba",
"protocol": "tcp",
"userGroups": [
{
"id": 972,
"name": "Administrators"
}
],
"users": [
{
"fullName": "Smith, John",
"id": 8952,
"name": "john_smith"
}
],
"vendor": "",
"version": "3.5.11",
"webApplications": [
{
"id": 30712,
"pages": [
{
"linkType": "html-ref",
"path": "/docs/config/index.html",
"response": 200
}
],
"root": "/",
"virtualHost": "102.89.22.253"
}
]
}
],
"software": [
{
"configurations": [
{
"name": "<name>",
"value": "<value>"
}
],
"cpe": {
"edition": "enterprise",
"language": "",
"other": "",
"part": "o",
"product": "windows_server_2008",
"swEdition": "",
"targetHW": "",
"targetSW": "",
"update": "sp1",
"v2.2": "cpe:/o:microsoft:windows_server_2008:-:sp1:enterprise",
"v2.3": "cpe:2.3:o:microsoft:windows_server_2008:-:sp1:enterprise:*:*:*:*:*",
"vendor": "microsoft",
"version": "-"
},
"description": "Microsoft Outlook 2013 15.0.4867.1000",
"family": "Office 2013",
"id": 0,
"product": "Outlook 2013",
"type": "Productivity",
"vendor": "Microsoft",
"version": "15.0.4867.1000"
}
],
"type": "",
"userGroups": [
{
"id": 972,
"name": "Administrators"
}
],
"users": [
{
"fullName": "Smith, John",
"id": 8952,
"name": "john_smith"
}
],
"vulnerabilities": {
"critical": 16,
"exploits": 4,
"malwareKits": 0,
"moderate": 3,
"severe": 76,
"total": 95
}
},
"error": null,
"has_error":false,
}
List Sites Alerts
Retrieve all alerts defined in the site.
Input Field
Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.
Input Name | Description | Required |
---|---|---|
Site Id | Jinja-templated text containing the site Id | Required |
Limit | Jinja-templated text containing the limit of records to fetch (Default is 100). | Optional |
Explode Results | Explode each result in a separate row. (Default is No) | Optional |
Output
JSON containing the following items:
{
"result": {
"enabled": false,
"enabledScanEvents": {
"failed": false,
"paused": false,
"resumed": false,
"started": false,
"stopped": false
},
"enabledVulnerabilityEvents": {
"confirmedVulnerabilities": false,
"potentialVulnerabilities": false,
"unconfirmedVulnerabilities": false,
"vulnerabilitySeverity": ""
},
"id": "",
"links": [
{
"href": "https://hostname:3780/api/3/...",
"rel": "self"
}
],
"maximumAlerts": "",
"name": "",
"notification": ""
},
"error": null,
"has_error":false,
}
Get Remediation
Returns the highest-superceding rollup solutions for a vulnerability on an asset. The solution(s) selected will be the most recent and cost-effective means by which the vulnerability can be remediated.
Input Field
Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.
Input Name | Description | Required |
---|---|---|
Asset Id | Jinja-templated text containing the asset Id. | Required |
Vulnerability Id | Jinja-templated text containing the vulnerability Id. | Required |
Explode Results | Explode each result in a separate row. (Default is No) | Optional |
Output
JSON containing the following items:
{
"result": {
"additionalInformation": {
"html": "",
"text": ""
},
"appliesTo": "libexpat1 on Ubuntu Linux",
"confidence": "",
"estimate": "PT10M",
"id": "ubuntu-upgrade-libexpat1",
"links": [
{
"href": "https://hostname:3780/api/3/...",
"rel": "self"
}
],
"matches": [
{
"check": "",
"confidence": "",
"fingerprint": {
"description": "Ubuntu libexpat1 2.1.0-4ubuntu1.2",
"family": "",
"product": "libexpat1",
"vendor": "Ubuntu",
"version": "2.1.0-4ubuntu1.2"
},
"links": [
{
"href": "https://hostname:3780/api/3/...",
"rel": "self"
}
],
"solution": "ubuntu-upgrade-libexpat1",
"type": "software"
}
],
"steps": {
"html": "<p>Use `apt-get upgrade` to upgrade libexpat1 to the latest version.</p>",
"text": "Use `apt-get upgrade` to upgrade libexpat1 to the latest version."
},
"summary": {
"html": "Upgrade libexpat1",
"text": "Upgrade libexpat1"
},
"type": "configuration"
},
"error": null,
"has_error":false,
}
Release Notes
v1.0.0
- Initial release with 10 new actions:List Assets
,Search Assets
,List Asset Groups
,List Tags
,List Vulnerabilities
,List Vulnerabilities Exception
,List Sites
,List Sites Assets
,List Sites Alerts
,Get Remediation
.
Updated 5 days ago