Domain name for API request: apm.intl.tencentcloudapi.com.
Query all vulnerability information of the user
A maximum of 20 requests can be initiated per second for this API.
The following request parameter list only provides API request parameters and some common parameters. For the complete common parameter list, see Common Request Parameters.
| Parameter Name | Required | Type | Description |
|---|---|---|---|
| Action | Yes | String | Common Params. The value used for this API: DescribeApmAllVulCount. |
| Version | Yes | String | Common Params. The value used for this API: 2021-06-22. |
| Region | Yes | String | Common Params. For more information, please see the list of regions supported by the product. |
| StartTime | Yes | Integer | unix second-level timestamp |
| EndTime | Yes | Integer | unix second-level timestamp |
| Parameter Name | Type | Description |
|---|---|---|
| VulnerabilityList | Array of ApmMetricRecord | Vulnerability metrics as well as number of business systems |
| VulnerabilityCount | Integer | Total number of vulnerabilities |
| ImportantVulnerabilityCount | Integer | Number of critical vulnerabilities |
| CriticalVulnerabilityCount | Integer | High-risk vulnerability count |
| RequestId | String | The unique request ID, generated by the server, will be returned for every request (if the request fails to reach the server for other reasons, the request will not obtain a RequestId). RequestId is required for locating a problem. |
Successful Example
POST / HTTP/1.1
Host: apm.intl.tencentcloudapi.com
Content-Type: application/json
X-TC-Action: DescribeApmAllVulCount
<Common request parameters>
{
"StartTime": 1741170000,
"EndTime": 1741173900
}
{
"Response": {
"CriticalVulnerabilityCount": 0,
"ImportantVulnerabilityCount": 64,
"RequestId": "1f1cd1b3-8129-4391-8554-f16e5e233d95",
"VulnerabilityCount": 64,
"VulnerabilityList": [
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-oJ7C40jYv"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2020-36518"
},
{
"Key": "vul.id",
"Value": "200006"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind buffer error vulnerability (CVE-2020-36518)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 3
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-ewyzCXlxj"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2021-46877"
},
{
"Key": "vul.id",
"Value": "200007"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "jackson-databind DoS vulnerability (CVE-2021-46877)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 3
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-ewyzCXlxj"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2022-42003"
},
{
"Key": "vul.id",
"Value": "200008"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind code issue vulnerability (CVE-2022-42003)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-21NwGgR53"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2022-42004"
},
{
"Key": "vul.id",
"Value": "200009"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind code issue vulnerability (CVE-2022-42004)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-avYdLEjHp"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2022-42004"
},
{
"Key": "vul.id",
"Value": "200009"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind code issue vulnerability (CVE-2022-42004)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 3
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-ewyzCXlxj"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2020-36518"
},
{
"Key": "vul.id",
"Value": "200006"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind buffer error vulnerability (CVE-2020-36518)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-21NwGgR53"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2021-46877"
},
{
"Key": "vul.id",
"Value": "200007"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "jackson-databind DoS vulnerability (CVE-2021-46877)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-oJ7C40jYv"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2021-46877"
},
{
"Key": "vul.id",
"Value": "200007"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "jackson-databind DoS vulnerability (CVE-2021-46877)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-oJ7C40jYv"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2022-42003"
},
{
"Key": "vul.id",
"Value": "200008"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind code issue vulnerability (CVE-2022-42003)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-21NwGgR53"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2020-36518"
},
{
"Key": "vul.id",
"Value": "200006"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind buffer error vulnerability (CVE-2020-36518)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-oJ7C40jYv"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2022-42004"
},
{
"Key": "vul.id",
"Value": "200009"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind code issue vulnerability (CVE-2022-42004)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 1
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-oJ7C40jYv"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.13.0"
},
{
"Key": "cve.id",
"Value": "CVE-2022-42003"
},
{
"Key": "vul.id",
"Value": "200008"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind code issue vulnerability (CVE-2022-42003)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 1
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-oJ7C40jYv"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.13.0"
},
{
"Key": "cve.id",
"Value": "CVE-2022-42004"
},
{
"Key": "vul.id",
"Value": "200009"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind code issue vulnerability (CVE-2022-42004)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 1
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-oJ7C40jYv"
},
{
"Key": "instrumentation.name",
"Value": "org.springframework.data:spring-data-commons"
},
{
"Key": "version",
"Value": "2.6.10"
},
{
"Key": "cve.id",
"Value": "CVE-2018-1259"
},
{
"Key": "vul.id",
"Value": "100356"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "Spring Data integration with XMLBeam has an XXE vulnerability"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-avYdLEjHp"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2021-46877"
},
{
"Key": "vul.id",
"Value": "200007"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "jackson-databind DoS vulnerability (CVE-2021-46877)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-21NwGgR53"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2022-42003"
},
{
"Key": "vul.id",
"Value": "200008"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind code issue vulnerability (CVE-2022-42003)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-avYdLEjHp"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2022-42003"
},
{
"Key": "vul.id",
"Value": "200008"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind code issue vulnerability (CVE-2022-42003)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 3
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-ewyzCXlxj"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2022-42004"
},
{
"Key": "vul.id",
"Value": "200009"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind code issue vulnerability (CVE-2022-42004)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 1
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-oJ7C40jYv"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.13.0"
},
{
"Key": "cve.id",
"Value": "CVE-2020-36518"
},
{
"Key": "vul.id",
"Value": "200006"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind buffer error vulnerability (CVE-2020-36518)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-avYdLEjHp"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2020-36518"
},
{
"Key": "vul.id",
"Value": "200006"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind buffer error vulnerability (CVE-2020-36518)"
}
]
}
]
}
}
TencentCloud API 3.0 integrates SDKs that support various programming languages to make it easier for you to call APIs.
The following only lists the error codes related to the API business logic. For other error codes, see Common Error Codes.
| Error Code | Description |
|---|---|
| FailedOperation | Operation failed. |
Was this page helpful?
You can also Contact sales or Submit a Ticket for help.
Help us improve! Rate your documentation experience in 5 mins.
Feedback