Domain name for API request: csip.intl.tencentcloudapi.com.
Retrieve vulnerability details.
A maximum of 20 requests can be initiated per second for this API.
The following request parameter list only provides API request parameters and some common parameters. For the complete common parameter list, see Common Request Parameters.
| Parameter Name | Required | Type | Description |
|---|---|---|---|
| Action | Yes | String | Common Params. The value used for this API: DescribeVULRiskDetail. |
| Version | Yes | String | Common Params. The value used for this API: 2022-11-21. |
| Region | No | String | Common Params. This parameter is not required. |
| MemberId.N | No | Array of String | Group Account Member ID |
| RiskId | No | String | Risk id. |
| PCMGRId | No | String | pcMgrId |
| Parameter Name | Type | Description |
|---|---|---|
| ServiceSupport | Array of ServiceSupport | Security product support. |
| VulTrend | Array of VulTrend | Vulnerability trends. |
| VulData | VULRiskInfo | Vulnerability supplementary information. |
| QuestionId | String | Assistant q&a id. |
| SessionId | String | Session ID |
| RequestId | String | The unique request ID, generated by the server, will be returned for every request (if the request fails to reach the server for other reasons, the request will not obtain a RequestId). RequestId is required for locating a problem. |
Retrieve vulnerability details
POST / HTTP/1.1
Host: csip.intl.tencentcloudapi.com
Content-Type: application/json
X-TC-Action: DescribeVULRiskDetail
<Common request parameters>
{
"PCMGRId": "pcmgr-33429"
}{
"Response": {
"QuestionId": "id-21b41oi",
"RequestId": "46d36ab9-84d0-4ad1-bc9f-284742f231b9",
"ServiceSupport": [
{
"IsSupport": false,
"ServiceName": "cfw_waf_virtual",
"SupportHandledCount": 0,
"SupportTotalCount": 0
},
{
"IsSupport": false,
"ServiceName": "cwp_detect",
"SupportHandledCount": 0,
"SupportTotalCount": 0
},
{
"IsSupport": false,
"ServiceName": "cwp_defense",
"SupportHandledCount": 0,
"SupportTotalCount": 0
},
{
"IsSupport": false,
"ServiceName": "cwp_fix",
"SupportHandledCount": 0,
"SupportTotalCount": 0
}
],
"SessionId": "12040124",
"VulData": {
"Describe": "Vim has an input validation vulnerability. Since it does not correctly filter escape characters, Vim 3.0 from version 7.2.010 to 7.x cannot properly escape characters. This allows a user-assisted attacker to (1) execute arbitrary shell commands by inputting K keystrokes on a line containing a semicolon followed by a command, or through (2) inputting parameters after Ctrl-] (control parentheses) or (3) g] (g parentheses) to execute arbitrary Ex commands. The keystroke sequence differs from the issue in CVE-2008-2712."
"Fix": "We recommend that you update the current system or software to the latest version to complete vulnerability fixes. Reference link: https://www.vim.org/download.php"
"ImpactComponent": [
{
"Component": "vim",
"Version": "1.0.1"
}
],
"References": "http://ftp.vim.org/pub/vim/patches/7.2/7.2.010,http://groups.google.com/group/vim_dev/attach/9290f26f9bc11b33/K-arbitrary-command-execution.patch.v3?part=2,http://groups.google.com/group/vim_dev/attach/dd32ad3a84f36bb2/K-arbitrary-command-execution.patch?part=2,http://groups.google.com/group/vim_dev/browse_thread/thread/1434d0812b5c817e/6ad2d5b50a96668e,http://groups.google.com/group/vim_dev/msg/9290f26f9bc11b33,http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html,http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html,http://secunia.com/advisories/31592,http://secunia.com/advisories/32222,http://secunia.com/advisories/32858,http://secunia.com/advisories/32864,http://secunia.com/advisories/33410,http://support.apple.com/kb/HT3216,http://support.apple.com/kb/HT4077,http://support.avaya.com/elmodocs2/security/ASA-2008-457.htm,http://support.avaya.com/elmodocs2/security/ASA-2009-001.htm,http://www.mandriva.com/security/advisories?name=MDVSA-2008:236,http://www.openwall.com/lists/oss-security/2008/09/11/3,http://www.openwall.com/lists/oss-security/2008/09/11/4,http://www.openwall.com/lists/oss-security/2008/09/16/5,http://www.openwall.com/lists/oss-security/2008/09/16/6,http://www.rdancer.org/vulnerablevim-K.html,http://www.redhat.com/support/errata/RHSA-2008-0580.html,http://www.redhat.com/support/errata/RHSA-2008-0617.html,http://www.redhat.com/support/errata/RHSA-2008-0618.html,http://www.securityfocus.com/archive/1/495662,http://www.securityfocus.com/archive/1/495703,http://www.securityfocus.com/archive/1/502322/100/0/threaded,http://www.securityfocus.com/bid/30795,http://www.securityfocus.com/bid/31681,http://www.ubuntu.com/usn/USN-712-1,http://www.vmware.com/security/advisories/VMSA-2009-0004.html,http://www.vupen.com/english/advisories/2008/2780,http://www.vupen.com/english/advisories/2009/0033,http://www.vupen.com/english/advisories/2009/0904,https://bugzilla.redhat.com/show_bug.cgi?id=461927,https://exchange.xforce.ibmcloud.com/vulnerabilities/44626,https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10894,https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5812"
},
"VulTrend": [
{
"AffectAssetCount": 0,
"AffectUserCount": 0,
"AttackCount": 0,
"Date": "2023-12-05"
},
{
"AffectAssetCount": 0,
"AffectUserCount": 0,
"AttackCount": 0,
"Date": "2023-12-06"
},
{
"AffectAssetCount": 0,
"AffectUserCount": 0,
"AttackCount": 0,
"Date": "2023-12-07"
},
{
"AffectAssetCount": 0,
"AffectUserCount": 0,
"AttackCount": 0,
"Date": "2023-12-08"
},
{
"AffectAssetCount": 0,
"AffectUserCount": 0,
"AttackCount": 0,
"Date": "2023-12-09"
},
{
"AffectAssetCount": 0,
"AffectUserCount": 0,
"AttackCount": 0,
"Date": "2023-12-10"
},
{
"AffectAssetCount": 0,
"AffectUserCount": 0,
"AttackCount": 0,
"Date": "2023-12-11"
}
]
}
}
TencentCloud API 3.0 integrates SDKs that support various programming languages to make it easier for you to call APIs.
The following only lists the error codes related to the API business logic. For other error codes, see Common Error Codes.
| Error Code | Description |
|---|---|
| AuthFailure | CAM signature/authentication error. |
| DryRunOperation | The request would have succeeded, but the DryRun parameter was used. |
| FailedOperation | Operation failed. |
| InternalError | An internal error occurs. |
| InvalidParameter | The parameter is incorrect. |
| InvalidParameterValue | Invalid parameter value. |
| LimitExceeded | The quota limit is reached. |
| MissingParameter | Missing parameters. |
| OperationDenied | Operation denied. |
| RequestLimitExceeded | Too many requests. |
| ResourceInUse | Occupied resource |
| ResourceInsufficient | Resources are insufficient. |
| ResourceNotFound | The resource doesn't exist. |
| ResourceUnavailable | The resource is unavailable |
| ResourcesSoldOut | The resources have been sold out. |
| UnauthorizedOperation | The operation is unauthorized. |
| UnknownParameter | The parameter is unknown. |
| UnsupportedOperation | The operation is not supported. |
Feedback