Domain name for API request: cwp.tencentcloudapi.com.
This API is used to obtain hot spot vulnerabilities across the entire network.
A maximum of 20 requests can be initiated per second for this API.
The following request parameter list only provides API request parameters and some common parameters. For the complete common parameter list, see Common Request Parameters.
Parameter Name | Required | Type | Description |
---|---|---|---|
Action | Yes | String | Common Params. The value used for this API: DescribeHotVulTop. |
Version | Yes | String | Common Params. The value used for this API: 2018-02-28. |
Region | No | String | Common Params. This parameter is not required. |
Parameter Name | Type | Description |
---|---|---|
List | Array of VulStoreListInfo | Vulnerability information Note: This field may return null, indicating that no valid values can be obtained. |
RequestId | String | The unique request ID, generated by the server, will be returned for every request (if the request fails to reach the server for other reasons, the request will not obtain a RequestId). RequestId is required for locating a problem. |
This example shows you how to obtain hot spot vulnerabilities of the whole network.
POST / HTTP/1.1
Host: cwp.tencentcloudapi.com
Content-Type: application/json
X-TC-Action: DescribeHotVulTop
<Common request parameters>
{}
{
"Response": {
"List": [
{
"AttackLevel": 3,
"CveId": "CVE-2023-23638",
"FixSwitch": 0,
"Level": 4,
"Method": 0,
"Name": " Vulnerability of Apache Dubbo deserialization remote code execution (CVE-2023-23638)",
"PublishDate": "2023-03-08 00:00:00",
"SupportDefense": 1,
"VulCategory": 2,
"VulId": 102561
},
{
"AttackLevel": 3,
"CveId": "CVE-2023-25194",
"FixSwitch": 0,
"Level": 3,
"Method": 0,
"Name": "Vulnerability of Apache Kafka Connect remote code execution (CVE-2023-25194)",
"PublishDate": "2023-02-08 00:00:00",
"SupportDefense": 1,
"VulCategory": 2,
"VulId": 102518
},
{
"AttackLevel": 3,
"CveId": "CVE-2022-42889",
"FixSwitch": 0,
"Level": 4,
"Method": 0,
"Name": "Vulnerability of Apache Commons Text StringLookup remote code execution (CVE-2022-42889)",
"PublishDate": "2022-10-13 00:00:00",
"SupportDefense": 1,
"VulCategory": 2,
"VulId": 102228
},
{
"AttackLevel": 3,
"CveId": "CVE-2022-42003",
"FixSwitch": 0,
"Level": 3,
"Method": 0,
"Name": "FasterXML jackson-databind code issue vulnerability (CVE-2022-42003)",
"PublishDate": "2022-10-02 00:00:00",
"SupportDefense": 1,
"VulCategory": 2,
"VulId": 102256
},
{
"AttackLevel": 3,
"CveId": "CVE-2022-33891",
"FixSwitch": 0,
"Level": 3,
"Method": 0,
"Name": "Apache Spark UI command injection vulnerability (CVE-2022-33891)",
"PublishDate": "2022-07-18 00:00:00",
"SupportDefense": 1,
"VulCategory": 2,
"VulId": 102133
}
],
"RequestId": "0d4c94aa-14b0-4b42-aeec-eeeae3266bb1"
}
}
TencentCloud API 3.0 integrates SDKs that support various programming languages to make it easier for you to call APIs.
The following only lists the error codes related to the API business logic. For other error codes, see Common Error Codes.
Error Code | Description |
---|---|
InternalError | Internal error |
InvalidParameter | Incorrect parameter. |
Was this page helpful?