1. 接口描述
接口请求域名: apm.tencentcloudapi.com 。
查询用户所有漏洞信息
默认接口请求频率限制:20次/秒。
推荐使用 API Explorer
点击调试
API Explorer 提供了在线调用、签名验证、SDK 代码生成和快速检索接口等能力。您可查看每次调用的请求内容和返回结果以及自动生成 SDK 调用示例。
2. 输入参数
以下请求参数列表仅列出了接口请求参数和部分公共参数,完整公共参数列表见 公共请求参数。
| 参数名称 | 必选 | 类型 | 描述 |
|---|---|---|---|
| Action | 是 | String | 公共参数,本接口取值:DescribeApmAllVulCount。 |
| Version | 是 | String | 公共参数,本接口取值:2021-06-22。 |
| Region | 是 | String | 公共参数,详见产品支持的 地域列表。 |
| StartTime | 是 | Integer | 秒级时间戳 示例值:1728910000 |
| EndTime | 是 | Integer | 秒级时间戳 示例值:1728910000 |
3. 输出参数
| 参数名称 | 类型 | 描述 |
|---|---|---|
| VulnerabilityList | Array of ApmMetricRecord | 包含漏洞指标以及业务系统个数 |
| VulnerabilityCount | Integer | 总漏洞个数 示例值:1 |
| ImportantVulnerabilityCount | Integer | 严重漏洞个数 示例值:1 |
| CriticalVulnerabilityCount | Integer | 高危漏洞个数 示例值:1 |
| RequestId | String | 唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。 |
4. 示例
示例1 成功示例
成功示例
输入示例
POST / HTTP/1.1
Host: apm.tencentcloudapi.com
Content-Type: application/json
X-TC-Action: DescribeApmAllVulCount
<公共请求参数>
{
"StartTime": 1741170000,
"EndTime": 1741173900
}
输出示例
{
"Response": {
"CriticalVulnerabilityCount": 0,
"ImportantVulnerabilityCount": 64,
"RequestId": "1f1cd1b3-8129-4391-8554-f16e5e233d95",
"VulnerabilityCount": 64,
"VulnerabilityList": [
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-oJ7C40jYv"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2020-36518"
},
{
"Key": "vul.id",
"Value": "200006"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind 缓冲区错误漏洞(CVE-2020-36518)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 3
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-ewyzCXlxj"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2021-46877"
},
{
"Key": "vul.id",
"Value": "200007"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "jackson-databind 拒绝服务漏洞(CVE-2021-46877)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 3
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-ewyzCXlxj"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2022-42003"
},
{
"Key": "vul.id",
"Value": "200008"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind 代码问题漏洞(CVE-2022-42003)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-21NwGgR53"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2022-42004"
},
{
"Key": "vul.id",
"Value": "200009"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind 代码问题漏洞(CVE-2022-42004)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-avYdLEjHp"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2022-42004"
},
{
"Key": "vul.id",
"Value": "200009"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind 代码问题漏洞(CVE-2022-42004)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 3
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-ewyzCXlxj"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2020-36518"
},
{
"Key": "vul.id",
"Value": "200006"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind 缓冲区错误漏洞(CVE-2020-36518)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-21NwGgR53"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2021-46877"
},
{
"Key": "vul.id",
"Value": "200007"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "jackson-databind 拒绝服务漏洞(CVE-2021-46877)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-oJ7C40jYv"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2021-46877"
},
{
"Key": "vul.id",
"Value": "200007"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "jackson-databind 拒绝服务漏洞(CVE-2021-46877)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-oJ7C40jYv"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2022-42003"
},
{
"Key": "vul.id",
"Value": "200008"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind 代码问题漏洞(CVE-2022-42003)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-21NwGgR53"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2020-36518"
},
{
"Key": "vul.id",
"Value": "200006"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind 缓冲区错误漏洞(CVE-2020-36518)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-oJ7C40jYv"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2022-42004"
},
{
"Key": "vul.id",
"Value": "200009"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind 代码问题漏洞(CVE-2022-42004)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 1
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-oJ7C40jYv"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.13.0"
},
{
"Key": "cve.id",
"Value": "CVE-2022-42003"
},
{
"Key": "vul.id",
"Value": "200008"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind 代码问题漏洞(CVE-2022-42003)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 1
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-oJ7C40jYv"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.13.0"
},
{
"Key": "cve.id",
"Value": "CVE-2022-42004"
},
{
"Key": "vul.id",
"Value": "200009"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind 代码问题漏洞(CVE-2022-42004)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 1
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-oJ7C40jYv"
},
{
"Key": "instrumentation.name",
"Value": "org.springframework.data:spring-data-commons"
},
{
"Key": "version",
"Value": "2.6.10"
},
{
"Key": "cve.id",
"Value": "CVE-2018-1259"
},
{
"Key": "vul.id",
"Value": "100356"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "Spring Data 集成 XMLBeam存在XXE漏洞"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-avYdLEjHp"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2021-46877"
},
{
"Key": "vul.id",
"Value": "200007"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "jackson-databind 拒绝服务漏洞(CVE-2021-46877)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-21NwGgR53"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2022-42003"
},
{
"Key": "vul.id",
"Value": "200008"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind 代码问题漏洞(CVE-2022-42003)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-avYdLEjHp"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2022-42003"
},
{
"Key": "vul.id",
"Value": "200008"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind 代码问题漏洞(CVE-2022-42003)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 3
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-ewyzCXlxj"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2022-42004"
},
{
"Key": "vul.id",
"Value": "200009"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind 代码问题漏洞(CVE-2022-42004)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 1
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-oJ7C40jYv"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.13.0"
},
{
"Key": "cve.id",
"Value": "CVE-2020-36518"
},
{
"Key": "vul.id",
"Value": "200006"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind 缓冲区错误漏洞(CVE-2020-36518)"
}
]
},
{
"Fields": [
{
"CompareVal": "",
"CompareVals": null,
"Key": "instance_count",
"LastPeriodValue": null,
"Unit": "",
"Value": 4
}
],
"Tags": [
{
"Key": "tapm.instance.key",
"Value": "apm-avYdLEjHp"
},
{
"Key": "instrumentation.name",
"Value": "com.fasterxml.jackson.core:jackson-databind"
},
{
"Key": "version",
"Value": "2.12.3"
},
{
"Key": "cve.id",
"Value": "CVE-2020-36518"
},
{
"Key": "vul.id",
"Value": "200006"
},
{
"Key": "level",
"Value": "important"
},
{
"Key": "score",
"Value": "7.50"
},
{
"Key": "vul.name",
"Value": "FasterXML jackson-databind 缓冲区错误漏洞(CVE-2020-36518)"
}
]
}
]
}
}
5. 开发者资源
腾讯云 API 平台
腾讯云 API 平台 是综合 API 文档、错误码、API Explorer 及 SDK 等资源的统一查询平台,方便您从同一入口查询及使用腾讯云提供的所有 API 服务。
API Inspector
用户可通过 API Inspector 查看控制台每一步操作关联的 API 调用情况,并自动生成各语言版本的 API 代码,也可前往 API Explorer 进行在线调试。
SDK
云 API 3.0 提供了配套的开发工具集(SDK),支持多种编程语言,能更方便的调用 API。
- Tencent Cloud SDK 3.0 for Python: CNB, GitHub, Gitee
- Tencent Cloud SDK 3.0 for Java: CNB, GitHub, Gitee
- Tencent Cloud SDK 3.0 for PHP: CNB, GitHub, Gitee
- Tencent Cloud SDK 3.0 for Go: CNB, GitHub, Gitee
- Tencent Cloud SDK 3.0 for Node.js: CNB, GitHub, Gitee
- Tencent Cloud SDK 3.0 for .NET: CNB, GitHub, Gitee
- Tencent Cloud SDK 3.0 for C++: CNB, GitHub, Gitee
- Tencent Cloud SDK 3.0 for Ruby: CNB, GitHub, Gitee
命令行工具
6. 错误码
以下仅列出了接口业务逻辑相关的错误码,其他错误码详见 公共错误码。
| 错误码 | 描述 |
|---|---|
| FailedOperation | 操作失败。 |