接口请求域名: apm.intl.tencentcloudapi.com 。
查询用户所有漏洞信息
默认接口请求频率限制:20次/秒。
以下请求参数列表仅列出了接口请求参数和部分公共参数,完整公共参数列表见 公共请求参数。
| 参数名称 | 必选 | 类型 | 描述 |
|---|---|---|---|
| Action | 是 | String | 公共参数,本接口取值:DescribeApmAllVulCount。 |
| Version | 是 | String | 公共参数,本接口取值:2021-06-22。 |
| Region | 是 | String | 公共参数,详见产品支持的 地域列表。 |
| StartTime | 是 | Integer | 秒级时间戳 |
| EndTime | 是 | Integer | 秒级时间戳 |
| 参数名称 | 类型 | 描述 |
|---|---|---|
| VulnerabilityList | Array of ApmMetricRecord | 包含漏洞指标以及业务系统个数 |
| VulnerabilityCount | Integer | 总漏洞个数 |
| ImportantVulnerabilityCount | Integer | 严重漏洞个数 |
| CriticalVulnerabilityCount | Integer | 高危漏洞个数 |
| RequestId | String | 唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。 |
成功示例
POST / HTTP/1.1
Host: apm.intl.tencentcloudapi.com
Content-Type: application/json
X-TC-Action: DescribeApmAllVulCount
<公共请求参数>
{
"StartTime": 1741170000,
"EndTime": 1741173900
}
{
"Response": {
"CriticalVulnerabilityCount": 0,
"ImportantVulnerabilityCount": 64,
"RequestId": "1f1cd1b3-8129-4391-8554-f16e5e233d95",
"VulnerabilityCount": 64,
"VulnerabilityList": [
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-oJ7C40jYv"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2020-36518"
},
{
"Key": "vul.id",
"Value": "200006"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind 缓冲区错误漏洞(CVE-2020-36518)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 3
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-ewyzCXlxj"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2021-46877"
},
{
"Key": "vul.id",
"Value": "200007"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "jackson-databind 拒绝服务漏洞(CVE-2021-46877)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 3
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-ewyzCXlxj"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2022-42003"
},
{
"Key": "vul.id",
"Value": "200008"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind 代码问题漏洞(CVE-2022-42003)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-21NwGgR53"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2022-42004"
},
{
"Key": "vul.id",
"Value": "200009"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind 代码问题漏洞(CVE-2022-42004)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-avYdLEjHp"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2022-42004"
},
{
"Key": "vul.id",
"Value": "200009"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind 代码问题漏洞(CVE-2022-42004)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 3
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-ewyzCXlxj"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2020-36518"
},
{
"Key": "vul.id",
"Value": "200006"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind 缓冲区错误漏洞(CVE-2020-36518)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-21NwGgR53"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2021-46877"
},
{
"Key": "vul.id",
"Value": "200007"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "jackson-databind 拒绝服务漏洞(CVE-2021-46877)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-oJ7C40jYv"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2021-46877"
},
{
"Key": "vul.id",
"Value": "200007"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "jackson-databind 拒绝服务漏洞(CVE-2021-46877)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-oJ7C40jYv"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2022-42003"
},
{
"Key": "vul.id",
"Value": "200008"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind 代码问题漏洞(CVE-2022-42003)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-21NwGgR53"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2020-36518"
},
{
"Key": "vul.id",
"Value": "200006"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind 缓冲区错误漏洞(CVE-2020-36518)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-oJ7C40jYv"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2022-42004"
},
{
"Key": "vul.id",
"Value": "200009"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind 代码问题漏洞(CVE-2022-42004)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 1
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-oJ7C40jYv"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.13.0"
},
{
"Key": "cve.id",
"Value": "CVE-2022-42003"
},
{
"Key": "vul.id",
"Value": "200008"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind 代码问题漏洞(CVE-2022-42003)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 1
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-oJ7C40jYv"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.13.0"
},
{
"Key": "cve.id",
"Value": "CVE-2022-42004"
},
{
"Key": "vul.id",
"Value": "200009"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind 代码问题漏洞(CVE-2022-42004)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 1
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-oJ7C40jYv"
},
{
"Key": "instrumentation.name",
"Value": "org.springframework.data:spring-data-commons"
},
{
"Key": "version",
"Value": "2.6.10"
},
{
"Key": "cve.id",
"Value": "CVE-2018-1259"
},
{
"Key": "vul.id",
"Value": "100356"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "Spring Data 集成 XMLBeam存在XXE漏洞"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-avYdLEjHp"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2021-46877"
},
{
"Key": "vul.id",
"Value": "200007"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "jackson-databind 拒绝服务漏洞(CVE-2021-46877)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-21NwGgR53"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2022-42003"
},
{
"Key": "vul.id",
"Value": "200008"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind 代码问题漏洞(CVE-2022-42003)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-avYdLEjHp"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2022-42003"
},
{
"Key": "vul.id",
"Value": "200008"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind 代码问题漏洞(CVE-2022-42003)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 3
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-ewyzCXlxj"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2022-42004"
},
{
"Key": "vul.id",
"Value": "200009"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind 代码问题漏洞(CVE-2022-42004)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 1
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-oJ7C40jYv"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.13.0"
},
{
"Key": "cve.id",
"Value": "CVE-2020-36518"
},
{
"Key": "vul.id",
"Value": "200006"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind 缓冲区错误漏洞(CVE-2020-36518)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-avYdLEjHp"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2020-36518"
},
{
"Key": "vul.id",
"Value": "200006"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind 缓冲区错误漏洞(CVE-2020-36518)"
}
]
}
]
}
}
云 API 3.0 提供了配套的开发工具集(SDK),支持多种编程语言,能更方便的调用 API。
以下仅列出了接口业务逻辑相关的错误码,其他错误码详见 公共错误码。
| 错误码 | 描述 |
|---|---|
| FailedOperation | 操作失败。 |
文档反馈