tencent cloud

云安全中心

产品简介
产品概述
购买指南
计费概述
购买方式
续费说明
欠费说明
退费说明
快速入门
操作指南
访问权限管理
多云多账号管理
漏洞与风险中心
告警中心
日志投递(支持多账号多产品多日志)
资产中心
安全体检
云 API 异常监测
用户行为分析(UEBA)
报告下载
API 文档
History
Introduction
API Category
Making API Requests
Multi-account management related APIs
Scan Task APIs
Risk Center APIs
Asset Center APIs
Cloud Boundary Analysis APIs
Cloud API Anomaly Detection APIs
Report Download APIs
Solid Protection APIs
Cloud Security Center Overview APIs
Data Types
Error Codes
相关协议
Service Level Agreement
Terms Of Service
常见问题
词汇表

DescribeVULList

PDF
聚焦模式
字号
最后更新时间: 2026-01-29 18:11:47

1. API Description

Domain name for API request: csip.intl.tencentcloudapi.com.

Security Center Risk Center - List of Vulnerabilities.

A maximum of 20 requests can be initiated per second for this API.

We recommend you to use API Explorer
Try it
API Explorer provides a range of capabilities, including online call, signature authentication, SDK code generation, and API quick search. It enables you to view the request, response, and auto-generated examples.

2. Input Parameters

The following request parameter list only provides API request parameters and some common parameters. For the complete common parameter list, see Common Request Parameters.

Parameter Name Required Type Description
Action Yes String Common Params. The value used for this API: DescribeVULList.
Version Yes String Common Params. The value used for this API: 2022-11-21.
Region No String Common Params. This parameter is not required.
MemberId.N No Array of String Group Account Member ID
Filter No Filter Query condition.

3. Output Parameters

Parameter Name Type Description
TotalCount Integer Total number.
Data Array of VULBaseInfo Vulnerability list
VULTypeLists Array of FilterDataObject Vulnerability Type List
RiskLevels Array of FilterDataObject Risk level list.
Tags Array of FilterDataObject Tag.
ProductSupport Array of FilterDataObject Product support.
CheckStatus Array of FilterDataObject Product support.
AttackHeat Array of FilterDataObject Attack intensity enumeration.
RequestId String The unique request ID, generated by the server, will be returned for every request (if the request fails to reach the server for other reasons, the request will not obtain a RequestId). RequestId is required for locating a problem.

4. Example

Example1 Example 1

Example 1

Input Example

POST / HTTP/1.1
Host: csip.intl.tencentcloudapi.com
Content-Type: application/json
X-TC-Action: DescribeVULList
<Common request parameters>

{
    "Filter": {
        "Limit": 3,
        "Offset": 0,
        "Filters": [
            {
                "Name": "EMGCVulType",
                "Values": [
                    "1"
                ]
            }
        ]
    }
}

Output Example

{
    "Response": {
        "AttackHeat": [
            {
No Popularity
                "Value": "0"
            },
            {
"Text": "High"
                "Value": "3"
            },
            {
"Text": "Low"
                "Value": "1"
            },
            {
"Text": "Chinese"
                "Value": "2"
            }
        ],
        "CheckStatus": [
            {
Scan complete
                "Value": "2"
            },
            {
"Text": "Not Scanned"
                "Value": "0"
            }
        ],
        "Data": [
            {
                "AffectAssetCount": 0,
                "AppName": "(vim) vim",
                "AttackHeat": 0,
                "CVE": "CVE-2008-4101",
                "CVSS": 0,
                "EMGCVulType": 1,
                "LastScanTime": "",
                "Level": "high",
                "PublishTime": "2008-09-19 01:59:00",
                "ScanStatus": 0,
                "SupportProduct": "cwp_detect,cwp_fix",
                "TaskId": "",
"VULName": "Vim input validation vulnerability"
"VULType": "Input validation"
                "VulTag": [
                    "NETWORK",
                    "POC",
                    "SYS",
                    "APP"
                ]
            },
            {
                "AffectAssetCount": 0,
                "AppName": "(radius_extension_project) radius",
                "AttackHeat": 0,
                "CVE": "CVE-2013-2220",
                "CVSS": 0,
                "EMGCVulType": 1,
                "LastScanTime": "",
                "Level": "high",
                "PublishTime": "2013-07-31 21:20:00",
                "ScanStatus": 0,
                "SupportProduct": "cwp_detect,cwp_fix",
                "TaskId": "",
"VULName": "PECL radius 'radius_get_vendor_attr()' Remote Denial of Service (DoS) Vulnerability"
"VULType": "Buffer error",
                "VulTag": [
                    "NETWORK",
                    "SYS"
                ]
            },
            {
                "AffectAssetCount": 0,
                "AppName": "(apache) activemq",
                "AttackHeat": 0,
                "CVE": "CVE-2016-3088",
                "CVSS": 9.8,
                "EMGCVulType": 1,
                "LastScanTime": "",
                "Level": "high",
                "PublishTime": "2016-06-01 16:59:04",
                "ScanStatus": 0,
                "SupportProduct": "cwp_detect,cwp_defense",
                "TaskId": "",
"VULName": "Apache ActiveMQ Fileserver Remote Code Execution Vulnerability (CVE-2016-3088)"
"VULType": "Input validation"
                "VulTag": [
                    "NETWORK",
                    "EXP",
                    "POC",
                    "KNOWN_EXPLOITED",
                    "SYS",
                    "APP"
                ]
            }
        ],
        "ProductSupport": [
            {
CSC automatic fix
                "Value": "cwp_fix"
            },
            {
Cloud Firewall (CFW) and Web application firewall enable virtual patch.
                "Value": "cfw_waf_virtual"
            },
            {
"Text": "CSC vulnerability detection"
                "Value": "cwp_detect"
            },
            {
"Text": "CSC vulnerability defense"
                "Value": "cwp_defense"
            }
        ],
        "RequestId": "d2e5b2ba-6ee2-4801-a378-af163d79a052",
        "RiskLevels": [
            {
"Text": "High risk",
                "Value": "high"
            },
            {
"Text": "Medium risk"
                "Value": "middle"
            },
            {
                "Text": "",
"Value": "unknown"
            },
            {
Low risk
                "Value": "low"
            }
        ],
        "Tags": [
            {
"Text": "Emergency"
                "Value": "IS_EMERGENCY"
            },
            {
compulsory
                "Value": "IS_SUGGEST"
            },
            {
The security vulnerability can be exploited remotely.
                "Value": "NETWORK"
            },
            {
The security vulnerability can be used as application component vulnerability detection.
                "Value": "APP"
            },
            {
"Text": "The vulnerability has an exploit"
                "Value": "EXP"
            },
            {
The vulnerability exists with exploitation in the wild or Wild Attacks.
                "Value": "KNOWN_EXPLOITED"
            },
            {
The vulnerability has a poc
                "Value": "POC"
            },
            {
The vulnerability can only be exploited locally.
                "Value": "LOCAL"
            },
            {
The vulnerability can be used as a system component vulnerability to detect.
                "Value": "SYS"
            }
        ],
        "TotalCount": 208,
        "VULTypeLists": [
            {
"Text": "Input Validation"
                "Value": "3"
            },
            {
Buffer error
                "Value": "12"
            },
            {
Race condition
                "Value": "9"
            },
            {
Permission license and access control
                "Value": "24"
            },
            {
Batch assignment of vulnerabilities
                "Value": "52"
            },
            {
"Text": "Code injection"
                "Value": "18"
            },
            {
"Text": "File upload",
                "Value": "35"
            },
            {
Deserialize
                "Value": "16"
            },
            {
"Text": "Path traversal"
                "Value": "21"
            },
            {
Trust Management
                "Value": "32"
            },
            {
Authorization issue
                "Value": "4"
            },
            {
"Text": "Code execution",
                "Value": "45"
            },
            {
Input verification error
                "Value": "42"
            },
            {
"Text": "SQL injection"
                "Value": "37"
            },
            {
"Text": "Unauthorized access"
                "Value": "53"
            },
            {
Infinite loop vulnerability
                "Value": "22"
            },
            {
Resource management error
                "Value": "6"
            },
            {
Command execution
                "Value": "41"
            },
            {
"Text": "Other",
                "Value": "0"
            },
            {
Operating system command injection
                "Value": "36"
            },
            {
"Text": "Inject"
                "Value": "11"
            },
            {
Improper permission management
                "Value": "20"
            },
            {
"Text": "null pointer reference"
                "Value": "10"
            },
            {
"Text": "integer overflow"
                "Value": "25"
            },
            {
Code issue
                "Value": "23"
            },
            {
"Text": "Out-of-bounds write"
                "Value": "5"
            },
            {
"Text": "Access control error"
                "Value": "30"
            },
            {
"Text": "Component Vulnerability"
                "Value": "56"
            },
            {
server-side request forgery
                "Value": "57"
            },
            {
Cross-site request forgery
                "Value": "15"
            },
            {
Incorrect currency numbers
                "Value": "28"
            },
            {
DoS
                "Value": "40"
            },
            {
buffer overflow
                "Value": "14"
            },
            {
"Text": "Out-of-bounds read"
                "Value": "1"
            },
            {
Configuration error
                "Value": "8"
            },
            {
Bypass security mode
                "Value": "61"
            },
            {
"Text": "Permission escalation",
                "Value": "54"
            },
            {
"Text": "Arbitrary file read"
                "Value": "71"
            },
            {
information leakage
                "Value": "2"
            },
            {
login bypass
                "Value": "60"
            },
            {
information leakage
                "Value": "43"
            },
            {
Parsing error
                "Value": "63"
            },
            {
"Text": "Xml injection",
                "Value": "78"
            },
            {
Permission and access control issues
                "Value": "13"
            },
            {
"Text": "XML external entity (XXE) injection"
                "Value": "29"
            },
            {
Cross-site scripting
                "Value": "44"
            },
            {
Command injection
                "Value": "34"
            },
            {
Split http request
                "Value": "59"
            },
            {
Security feature issue
                "Value": "48"
            },
            {
Material shortage
                "Value": "33"
            },
            {
Double Free vulnerability
                "Value": "17"
            },
            {
Encryption issue
                "Value": "7"
            },
            {
url redirection
                "Value": "49"
            },
            {
"Text": "Weak password",
                "Value": "62"
            },
            {
Trust management issues
                "Value": "46"
            },
            {
"Text": "Post link",
                "Value": "19"
            },
            {
Design error
                "Value": "38"
            },
            {
CRLF injection
                "Value": "31"
            },
            {
Data reliability not fully verified
                "Value": "51"
            },
            {
"Text": "Local file inclusion"
                "Value": "50"
            },
            {
Race condition issue
                "Value": "58"
            },
            {
"Text": "Access control",
                "Value": "26"
            },
            {
"Text": "Path traversal"
                "Value": "27"
            },
            {
"Text": "Invalid pointer reference"
                "Value": "55"
            },
            {
LDAP injection vulnerability
                "Value": "47"
            },
            {
"Text": "Format string"
                "Value": "67"
            },
            {
"Text": "Session fixed",
                "Value": "69"
            },
            {
ldap injection
                "Value": "70"
            },
            {
man-in-the-middle attack
                "Value": "72"
            },
            {
http request forgery
                "Value": "73"
            },
            {
http response spoofing
                "Value": "64"
            },
            {
"Text": "Boundary condition error"
                "Value": "68"
            },
            {
"Text": "Unknown",
                "Value": "66"
            },
            {
Access verification error
                "Value": "65"
            },
            {
remote overflow
                "Value": "75"
            },
            {
backdoor
                "Value": "76"
            },
            {
Local overflow
                "Value": "77"
            },
            {
Arbitrary file download
                "Value": "80"
            },
            {
Obfuscation proxy
                "Value": "79"
            },
            {
Directory traversal
                "Value": "81"
            },
            {
Permission verification insufficient
                "Value": "82"
            },
            {
Processing logic error
                "Value": "83"
            },
            {
Xpath injection
                "Value": "84"
            },
            {
"Text": "Path leakage"
                "Value": "86"
            }
        ]
    }
}

5. Developer Resources

SDK

TencentCloud API 3.0 integrates SDKs that support various programming languages to make it easier for you to call APIs.

Command Line Interface

6. Error Code

There is no error code related to the API business logic. For other error codes, please see Common Error Codes.

帮助和支持

本页内容是否解决了您的问题?

填写满意度调查问卷,共创更好文档体验。

文档反馈