1. 接口描述
接口请求域名: csip.tencentcloudapi.com 。
获取漏洞展开详情
默认接口请求频率限制:20次/秒。
推荐使用 API Explorer
点击调试
API Explorer 提供了在线调用、签名验证、SDK 代码生成和快速检索接口等能力。您可查看每次调用的请求内容和返回结果以及自动生成 SDK 调用示例。
2. 输入参数
以下请求参数列表仅列出了接口请求参数和部分公共参数,完整公共参数列表见 公共请求参数。
参数名称 | 必选 | 类型 | 描述 |
---|---|---|---|
Action | 是 | String | 公共参数,本接口取值:DescribeVULRiskDetail。 |
Version | 是 | String | 公共参数,本接口取值:2022-11-21。 |
Region | 否 | String | 公共参数,此参数为可选参数。 |
MemberId.N | 否 | Array of String | 集团账号的成员id 示例值:["mem-6wfo0fzks3","mem-85fo0fzks4"] |
RiskId | 否 | String | 风险id 示例值:id-d3fb24eb9 |
PCMGRId | 否 | String | pcMgrId 示例值:pcmgr-1542 |
3. 输出参数
参数名称 | 类型 | 描述 |
---|---|---|
ServiceSupport | Array of ServiceSupport | 安全产品支持情况 示例值:[ { "IsSupport": false, "ServiceName": "cfw_waf_virtual", "SupportHandledCount": 0, "SupportTotalCount": 0 }, { "IsSupport": false, "ServiceName": "cwp_detect", "SupportHandledCount": 0, "SupportTotalCount": 0 }, { "IsSupport": false, "ServiceName": "cwp_defense", "SupportHandledCount": 0, "SupportTotalCount": 0 }, { "IsSupport": false, "ServiceName": "cwp_fix", "SupportHandledCount": 0, "SupportTotalCount": 0 } ] |
VulTrend | Array of VulTrend | 漏洞趋势 示例值:[ { "AffectAssetCount": 0, "AffectUserCount": 0, "AttackCount": 0, "Date": "2023-12-05" }, { "AffectAssetCount": 0, "AffectUserCount": 0, "AttackCount": 0, "Date": "2023-12-06" }, { "AffectAssetCount": 0, "AffectUserCount": 0, "AttackCount": 0, "Date": "2023-12-07" }, { "AffectAssetCount": 0, "AffectUserCount": 0, "AttackCount": 0, "Date": "2023-12-08" }, { "AffectAssetCount": 0, "AffectUserCount": 0, "AttackCount": 0, "Date": "2023-12-09" }, { "AffectAssetCount": 0, "AffectUserCount": 0, "AttackCount": 0, "Date": "2023-12-10" }, { "AffectAssetCount": 0, "AffectUserCount": 0, "AttackCount": 0, "Date": "2023-12-11" } ] |
VulData | VULRiskInfo | 漏洞补充信息 示例值:{ "Describe": "Vim存在输入验证漏洞。由于没有正确的过滤转义字符,从7.2.010到7.x的Vim 3.0不能正确地转义字符,这使得用户辅助攻击者可以(1)通过在包含“;”的行上输入K击键来执行任意的shell命令。(分号)后接命令,或通过在(2)“ Ctrl-]”(控制小括号)或(3)“ g]”(g小括号)后输入参数来执行任意Ex命令)击键顺序,与CVE-2008-2712的问题不同。", "Fix": " 建议您更新当前系统或软件至最新版,完成漏洞的修复。参考链接:https://www.vim.org/download.php", "ImpactComponent": [ { "Component": "vim", "Version": "1.0.1" } ], "References": "http://ftp.vim.org/pub/vim/patches/7.2/7.2.010,http://groups.google.com/group/vim_dev/attach/9290f26f9bc11b33/K-arbitrary-command-execution.patch.v3?part=2,http://groups.google.com/group/vim_dev/attach/dd32ad3a84f36bb2/K-arbitrary-command-execution.patch?part=2,http://groups.google.com/group/vim_dev/browse_thread/thread/1434d0812b5c817e/6ad2d5b50a96668e,http://groups.google.com/group/vim_dev/msg/9290f26f9bc11b33,http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html,http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html,http://secunia.com/advisories/31592,http://secunia.com/advisories/32222,http://secunia.com/advisories/32858,http://secunia.com/advisories/32864,http://secunia.com/advisories/33410,http://support.apple.com/kb/HT3216,http://support.apple.com/kb/HT4077,http://support.avaya.com/elmodocs2/security/ASA-2008-457.htm,http://support.avaya.com/elmodocs2/security/ASA-2009-001.htm,http://www.mandriva.com/security/advisories?name=MDVSA-2008:236,http://www.openwall.com/lists/oss-security/2008/09/11/3,http://www.openwall.com/lists/oss-security/2008/09/11/4,http://www.openwall.com/lists/oss-security/2008/09/16/5,http://www.openwall.com/lists/oss-security/2008/09/16/6,http://www.rdancer.org/vulnerablevim-K.html,http://www.redhat.com/support/errata/RHSA-2008-0580.html,http://www.redhat.com/support/errata/RHSA-2008-0617.html,http://www.redhat.com/support/errata/RHSA-2008-0618.html,http://www.securityfocus.com/archive/1/495662,http://www.securityfocus.com/archive/1/495703,http://www.securityfocus.com/archive/1/502322/100/0/threaded,http://www.securityfocus.com/bid/30795,http://www.securityfocus.com/bid/31681,http://www.ubuntu.com/usn/USN-712-1,http://www.vmware.com/security/advisories/VMSA-2009-0004.html,http://www.vupen.com/english/advisories/2008/2780,http://www.vupen.com/english/advisories/2009/0033,http://www.vupen.com/english/advisories/2009/0904,https://bugzilla.redhat.com/show_bug.cgi?id=461927,https://exchange.xforce.ibmcloud.com/vulnerabilities/44626,https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10894,https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5812" } |
QuestionId | String | 小助手问答id 示例值:csipllm-witt |
SessionId | String | 会话id 示例值:cve-2081-3346 |
RequestId | String | 唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。 |
4. 示例
示例1 获取漏洞展开详情
获取漏洞展开详情
输入示例
POST / HTTP/1.1
Host: csip.tencentcloudapi.com
Content-Type: application/json
X-TC-Action: DescribeVULRiskDetail
<公共请求参数>
{
"PCMGRId": "pcmgr-33429"
}
输出示例
{
"Response": {
"QuestionId": "id-21b41oi",
"RequestId": "46d36ab9-84d0-4ad1-bc9f-284742f231b9",
"ServiceSupport": [
{
"IsSupport": false,
"ServiceName": "cfw_waf_virtual",
"SupportHandledCount": 0,
"SupportTotalCount": 0
},
{
"IsSupport": false,
"ServiceName": "cwp_detect",
"SupportHandledCount": 0,
"SupportTotalCount": 0
},
{
"IsSupport": false,
"ServiceName": "cwp_defense",
"SupportHandledCount": 0,
"SupportTotalCount": 0
},
{
"IsSupport": false,
"ServiceName": "cwp_fix",
"SupportHandledCount": 0,
"SupportTotalCount": 0
}
],
"SessionId": "12040124",
"VulData": {
"Describe": "Vim存在输入验证漏洞。由于没有正确的过滤转义字符,从7.2.010到7.x的Vim 3.0不能正确地转义字符,这使得用户辅助攻击者可以(1)通过在包含“;”的行上输入K击键来执行任意的shell命令。(分号)后接命令,或通过在(2)“ Ctrl-]”(控制小括号)或(3)“ g]”(g小括号)后输入参数来执行任意Ex命令)击键顺序,与CVE-2008-2712的问题不同。",
"Fix": " 建议您更新当前系统或软件至最新版,完成漏洞的修复。参考链接:https://www.vim.org/download.php",
"ImpactComponent": [
{
"Component": "vim",
"Version": "1.0.1"
}
],
"References": "http://ftp.vim.org/pub/vim/patches/7.2/7.2.010,http://groups.google.com/group/vim_dev/attach/9290f26f9bc11b33/K-arbitrary-command-execution.patch.v3?part=2,http://groups.google.com/group/vim_dev/attach/dd32ad3a84f36bb2/K-arbitrary-command-execution.patch?part=2,http://groups.google.com/group/vim_dev/browse_thread/thread/1434d0812b5c817e/6ad2d5b50a96668e,http://groups.google.com/group/vim_dev/msg/9290f26f9bc11b33,http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html,http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html,http://secunia.com/advisories/31592,http://secunia.com/advisories/32222,http://secunia.com/advisories/32858,http://secunia.com/advisories/32864,http://secunia.com/advisories/33410,http://support.apple.com/kb/HT3216,http://support.apple.com/kb/HT4077,http://support.avaya.com/elmodocs2/security/ASA-2008-457.htm,http://support.avaya.com/elmodocs2/security/ASA-2009-001.htm,http://www.mandriva.com/security/advisories?name=MDVSA-2008:236,http://www.openwall.com/lists/oss-security/2008/09/11/3,http://www.openwall.com/lists/oss-security/2008/09/11/4,http://www.openwall.com/lists/oss-security/2008/09/16/5,http://www.openwall.com/lists/oss-security/2008/09/16/6,http://www.rdancer.org/vulnerablevim-K.html,http://www.redhat.com/support/errata/RHSA-2008-0580.html,http://www.redhat.com/support/errata/RHSA-2008-0617.html,http://www.redhat.com/support/errata/RHSA-2008-0618.html,http://www.securityfocus.com/archive/1/495662,http://www.securityfocus.com/archive/1/495703,http://www.securityfocus.com/archive/1/502322/100/0/threaded,http://www.securityfocus.com/bid/30795,http://www.securityfocus.com/bid/31681,http://www.ubuntu.com/usn/USN-712-1,http://www.vmware.com/security/advisories/VMSA-2009-0004.html,http://www.vupen.com/english/advisories/2008/2780,http://www.vupen.com/english/advisories/2009/0033,http://www.vupen.com/english/advisories/2009/0904,https://bugzilla.redhat.com/show_bug.cgi?id=461927,https://exchange.xforce.ibmcloud.com/vulnerabilities/44626,https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10894,https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5812"
},
"VulTrend": [
{
"AffectAssetCount": 0,
"AffectUserCount": 0,
"AttackCount": 0,
"Date": "2023-12-05"
},
{
"AffectAssetCount": 0,
"AffectUserCount": 0,
"AttackCount": 0,
"Date": "2023-12-06"
},
{
"AffectAssetCount": 0,
"AffectUserCount": 0,
"AttackCount": 0,
"Date": "2023-12-07"
},
{
"AffectAssetCount": 0,
"AffectUserCount": 0,
"AttackCount": 0,
"Date": "2023-12-08"
},
{
"AffectAssetCount": 0,
"AffectUserCount": 0,
"AttackCount": 0,
"Date": "2023-12-09"
},
{
"AffectAssetCount": 0,
"AffectUserCount": 0,
"AttackCount": 0,
"Date": "2023-12-10"
},
{
"AffectAssetCount": 0,
"AffectUserCount": 0,
"AttackCount": 0,
"Date": "2023-12-11"
}
]
}
}
5. 开发者资源
腾讯云 API 平台
腾讯云 API 平台 是综合 API 文档、错误码、API Explorer 及 SDK 等资源的统一查询平台,方便您从同一入口查询及使用腾讯云提供的所有 API 服务。
API Inspector
用户可通过 API Inspector 查看控制台每一步操作关联的 API 调用情况,并自动生成各语言版本的 API 代码,也可前往 API Explorer 进行在线调试。
SDK
云 API 3.0 提供了配套的开发工具集(SDK),支持多种编程语言,能更方便的调用 API。
- Tencent Cloud SDK 3.0 for Python: GitHub Gitee
- Tencent Cloud SDK 3.0 for Java: GitHub Gitee
- Tencent Cloud SDK 3.0 for PHP: GitHub Gitee
- Tencent Cloud SDK 3.0 for Go: GitHub Gitee
- Tencent Cloud SDK 3.0 for Node.js: GitHub Gitee
- Tencent Cloud SDK 3.0 for .NET: GitHub Gitee
- Tencent Cloud SDK 3.0 for C++: GitHub Gitee
- Tencent Cloud SDK 3.0 for Ruby: GitHub Gitee
命令行工具
6. 错误码
以下仅列出了接口业务逻辑相关的错误码,其他错误码详见 公共错误码。
错误码 | 描述 |
---|---|
AuthFailure | CAM签名/鉴权错误。 |
DryRunOperation | DryRun 操作,代表请求将会是成功的,只是多传了 DryRun 参数。 |
FailedOperation | 操作失败。 |
InternalError | 内部错误。 |
InvalidParameter | 参数错误。 |
InvalidParameterValue | 参数取值错误。 |
LimitExceeded | 超过配额限制。 |
MissingParameter | 缺少参数错误。 |
OperationDenied | 操作被拒绝。 |
RequestLimitExceeded | 请求的次数超过了频率限制。 |
ResourceInUse | 资源被占用。 |
ResourceInsufficient | 资源不足。 |
ResourceNotFound | 资源不存在。 |
ResourceUnavailable | 资源不可用。 |
ResourcesSoldOut | 资源售罄。 |
UnauthorizedOperation | 未授权操作。 |
UnknownParameter | 未知参数错误。 |
UnsupportedOperation | 操作不支持。 |