Query a list of vulnerabilities.

You can call this operation to query a list of vulnerabilities.

Debugging

OpenAPI Explorer automatically calculates the signature value. For your convenience, we recommend that you call this operation in OpenAPI Explorer. OpenAPI Explorer dynamically generates the sample code of the operation for different SDKs.

Request parameters

Parameter Type Required Example Description
Action String Yes DescribeVulList

The operation that you want to perform.

Set the value to DescribeVulList.

AliasName String No RHSA-2019:0230-Important: polkit security update

The alias of the vulnerability.

CurrentPage Integer No 1

The number of the page to return.

Pages start from page 1.

Default value: 1.

Dealed String No n

Specifies whether the vulnerability has been handled.

Valid values:

  • y: handled
  • n: unhandled
Lang String No zh

The language type.

Valid values:

  • zh: Chinese
  • en: English
Necessity String No asap,later,nntf

The priority to fix vulnerabilities. Separate multiple priorities with commas (,).

Valid values:

  • asap: high
  • later: medium
  • nntf: low
PageSize Integer No 20

The number of entries to return on each page of the vulnerability list.

Default value: 20.

Remark String No 192.168.1.1

The tags to query, including the internal IP address, public IP address, and name of the asset.

Type String No cve

The type of the vulnerability. Valid values:

  • cve: Linux software vulnerabilities
  • sys: Windows system vulnerabilities
  • cms: Web CMS vulnerabilities
  • app: application vulnerabilities
  • emg: urgent vulnerabilities
Uuids String No 1587bedb-fdb4-48c4-9330-************

The UUID list of the server. Separate multiple UUIDs with commas (,).

Response parameters

Parameter Type Example Description
RequestId String ECDE6715-6286-40E6-A32D-3094051FD74D

The ID of the request.

CurrentPage Integer 1

The current page number.

PageSize Integer 20

The number of entries returned on each page.

TotalCount Integer 2

The total number of query results.

VulRecords

The list of vulnerabilities.

AliasName String RHSA-2017:0574: gnutls security, bug fix, and enhancement update

The alias of the vulnerability.

ExtendContentJson

The extended information.

AbsolutePath String /roo/www/web

The absolute path.

AliasName String RHSA-2017:0574: gnutls security, bug fix, and enhancement update

The alias of the vulnerability.

LastTs Long 1554189334000

The last time when the vulnerability was detected.

Necessity

The priority to fix vulnerabilities.

Assets_factor String 1

The asset score.

Cvss_factor String 7.8

The Common Vulnerability Scoring System (CVSS) score.

Enviroment_factor String 1.0

The environmental score.

Gmt_create String 20190331

The creation time.

Is_calc String 1

Indicates whether the vulnerability severity score is calculated.

  • 0: The score is not calculated.
  • 1: The score is calculated.
Status String normal

The status of the event.

Valid values:

  • none: No score is generated.
  • pending: The score is pending calculation.
  • miss: The score failed to be calculated.
  • normal: The score is calculated and generated.
Time_factor String 1.0

The temporal score.

Total_score String 7.8

The total score.

Os String centos

The operating system.

OsRelease String 7

The release of the operating system.

PrimaryId Long 111

The ID of the vulnerability.

RpmEntityList

The RPM package list.

FullVersion String 3.10.0-693.2.2.el7

The full version number.

MatchDetail String python-perf version less than 0:3.10.0-693.21.1.el7

The matching details.

Name String python-perf

The name of the RPM.

Path String /usr/lib64/python2.7/site-packages

The file path.

UpdateCmd String yum update python-perf

The fix command.

Version String 3.10.0

The version number.

Status Integer 1

The status of the vulnerability.

Valid values:

  • 1: unfixed
  • 2: fix failed
  • 3: rollback failed
  • 4: fixing
  • 5: rolling back
  • 6: verifying
  • 7: fixed
  • 8: fixed and to be restarted
  • 9: rolled back
  • 10: ignored
  • 11: rolled back and to be restarted
  • 12: not found
  • 20: expired
Tag String oval

The tag of the vulnerability.

cveList ["CVE-2016-8610", "CVE-2017-5335" ]

The CVE list.

FirstTs Long 1554189334000

The first time when the vulnerability was detected. This value is a timestamp.

GroupId Integer 281801

The ID of the asset group.

InstanceId String i-bp18tnigcymjvmc2fw9e

The instance ID of the asset.

InstanceName String Test ECS

The instance name of the asset.

InternetIp String 47.99.0.0

The public IP address of the asset.

IntranetIp String 192.1.1.1

The internal IP address of the asset.

Ip String 47.99.0.0

The IP address of the asset. The public IP address of the asset is displayed first.

LastTs Long 1541207563000

The last time when the vulnerability was detected. This value is a timestamp.

ModifyTs Long 1541207563000

The time when the vulnerability was fixed. This value is a timestamp.

Name String oval:com.redhat.rhsa:def:20170574

The name of the vulnerability.

Necessity String asap

The priority to fix vulnerabilities. Valid values:

  • asap: high
  • later: medium
  • nntf: low
NeedReboot String yes

Indicates whether a restart is required. Valid values:

  • yes
  • no
OsVersion String linux

The operating system version.

PrimaryId Long 101162078

The ID of the vulnerability.

Related String CVE-2017-7518,CVE-2017-12188

The list of CVEs related to the vulnerability. Separate multiple CVEs with commas (,).

RepairTs Long 1541207563000

The time when the vulnerability was fixed. This value is a timestamp.

ResultCode String 0

The result code returned after the vulnerability is fixed.

ResultMessage String timeout

The message returned after the vulnerability is fixed.

Status Integer 1

The status of the vulnerability. Valid values:

  • 1: unfixed
  • 2: fix failed
  • 3: rollback failed
  • 4: fixing
  • 5: rolling back
  • 6: verifying
  • 7: fixed
  • 8: fixed and to be restarted
  • 9: rolled back
  • 10: ignored
  • 11: rolled back and to be restarted
  • 12: not found
  • 20: expired
Tag String oval

The tag of the vulnerability.

Type String cve

The type of the vulnerability. Valid values:

  • cve: Linux vulnerabilities
  • sys: Windows vulnerabilities
  • cms: Web CMS vulnerabilities
  • emg: urgent vulnerabilities
  • app: application vulnerabilities
Uuid String 04c56617-23fc-43a5-ab9b-************

The UUID of the asset.

Examples

Sample requests


http(s)://[Endpoint]/? Action=DescribeVulList
&<Common request parameters>

Sample success responses

XML format

<DescribeVulList>
	  <TotalCount>6430</TotalCount>
	  <PageSize>2</PageSize>
	  <RequestId>ECDE6715-6286-40E6-A32D-3094051FD74D</RequestId>
	  <CurrentPage>1</CurrentPage>
	  <VulRecords>
		    <Necessity>asap</Necessity>
		    <Uuid>04c56617-23fc-43a5-ab9b-755da574ffe8</Uuid>
		    <Ip>47.99.63.178</Ip>
		    <ModifyTs>1541347310000</ModifyTs>
		    <Type>cve</Type>
		    <FirstTs>1541207563000</FirstTs>
		    <InstanceId>i-bp18tnigcymjvmc2fw9e</InstanceId>
		    <InternetIp>47.99.63.178</InternetIp>
		    <ResultMessage>
			out:Loaded plugins: security
			Setting up Update Process
			Resolving Dependencies
			--&gt; Running transaction check
			---&gt; Package gnutls.x86_64 0:2.8.5-14.el6_5 will be updated
			---&gt; Package gnutls.x86_64 0:2.12.23-22.el6 will be an update
			--&gt; Finished Dependency Resolution
			
			Dependencies Resolved
			
			================================================================================
			 Package         Arch            Version                    Repository     Size
			================================================================================
			Updating:
			 gnutls          x86_64          2.12.23-22.el6             base          389 k
			
			Transaction Summary
			================================================================================
			Upgrade       1 Package(s)
			
			Total download size: 389 k
			Downloading Packages:
			Running rpm_check_debug
			Running Transaction Test
			Transaction Test Succeeded
			Running Transaction
			
Updating   : gnutls-2.12.23-22.el6.x86_64                                 1/2
			
Cleanup    : gnutls-2.8.5-14.el6_5.x86_64                                 2/2
			
Verifying  : gnutls-2.12.23-22.el6.x86_64                                 1/2
			
Verifying  : gnutls-2.8.5-14.el6_5.x86_64                                 2/2
			
			Updated:
			gnutls.x86_64 0:2.12.23-22.el6                                               
			
			Complete!
			
		err:</ResultMessage>
		    <Related>CVE-2016-8610,CVE-2017-5335,CVE-2017-5336,CVE-2017-5337</Related>
		    <GroupId>281801</GroupId>
		    <OsVersion>linux</OsVersion>
		    <ExtendContentJson>
			      <Necessity>
				        <Status>pending</Status>
			      </Necessity>
			      <Os>centos</Os>
			      <cveList>CVE-2016-8610</cveList>
			      <cveList>CVE-2017-5335</cveList>
			      <cveList>CVE-2017-5336</cveList>
			      <cveList>CVE-2017-5337</cveList>
			      <RpmEntityList>
				        <Name>gnutls</Name>
				        <Version>2.8.5</Version>
				        <FullVersion>2.8.5-14.el6_5</FullVersion>
				        <MatchDetail>gnutls version less than 0:2.12.23-21.el6</MatchDetail>
				        <UpdateCmd>yum update gnutls</UpdateCmd>
				        <Path>/usr/lib64/libgnutls-extra.so.26</Path>
			      </RpmEntityList>
			      <OsRelease>6</OsRelease>
		    </ExtendContentJson>
		    <Name>oval:com.redhat.rhsa:def:20170574</Name>
		    <Status>7</Status>
		    <LastTs>1541207563000</LastTs>
		    <NeedReboot>no</NeedReboot>
		    <AliasName>RHSA-2017:0574: gnutls security, bug fix, and enhancement update</AliasName>
		    <Tag>oval</Tag>
		    <IntranetIp>10.0.0.173</IntranetIp>
		    <PrimaryId>101162078</PrimaryId>
		    <ResultCode>0</ResultCode>
		    <Level>serious</Level>
		    <InstanceName>Aegis123456789</InstanceName>
	  </VulRecords>
	  <VulRecords>
		    <Necessity>later</Necessity>
		    <Uuid>1bfac26f-0301-435e-bcfd-2cdbd271c8a1</Uuid>
		    <Ip>172.19.220.94</Ip>
		    <ModifyTs>1554096622000</ModifyTs>
		    <Type>cve</Type>
		    <FirstTs>1550891785000</FirstTs>
		    <InstanceId>i-uf6iywlcvu7n0v8er15l</InstanceId>
		    <InternetIp></InternetIp>
		    <Related>CVE-2017-7518,CVE-2017-12188</Related>
		    <GroupId>281801</GroupId>
		    <OsVersion>linux</OsVersion>
		    <ExtendContentJson>
			      <Necessity>
				        <Cvss_factor>7.8</Cvss_factor>
				        <Total_score>7.8</Total_score>
				        <Status>normal</Status>
				        <Enviroment_factor>1.0</Enviroment_factor>
				        <Time_factor>1.0</Time_factor>
				        <Assets_factor>1</Assets_factor>
				        <Gmt_create>20190331</Gmt_create>
				        <Is_calc>1</Is_calc>
			      </Necessity>
			      <Os>centos</Os>
			      <cveList>CVE-2017-7518</cveList>
			      <cveList>CVE-2017-12188</cveList>
			      <RpmEntityList>
				        <Name>kernel</Name>
				        <Version>3.10.0</Version>
				        <FullVersion>3.10.0-693.2.2.el7</FullVersion>
				        <MatchDetail>kernel version less than 0:3.10.0-693.21.1.el7</MatchDetail>
				        <UpdateCmd>yum update kernel</UpdateCmd>
				        <Path>/boot/.vmlinuz-3.10.0-693.2.2.el7.x86_64.hmac</Path>
			      </RpmEntityList>
			      <RpmEntityList>
				        <Name>kernel-headers</Name>
				        <Version>3.10.0</Version>
				        <FullVersion>3.10.0-693.2.2.el7</FullVersion>
				        <MatchDetail>kernel-headers version less than 0:3.10.0-693.21.1.el7</MatchDetail>
				        <UpdateCmd>yum update kernel-headers</UpdateCmd>
				        <Path>/usr/include/asm</Path>
			      </RpmEntityList>
			      <RpmEntityList>
				        <Name>kernel-tools</Name>
				        <Version>3.10.0</Version>
				        <FullVersion>3.10.0-693.2.2.el7</FullVersion>
				        <MatchDetail>kernel-tools version less than 0:3.10.0-693.21.1.el7</MatchDetail>
				        <UpdateCmd>yum update kernel-tools</UpdateCmd>
				        <Path>/etc/sysconfig/cpupower</Path>
			      </RpmEntityList>
			      <RpmEntityList>
				        <Name>kernel-tools-libs</Name>
				        <Version>3.10.0</Version>
				        <FullVersion>3.10.0-693.2.2.el7</FullVersion>
				        <MatchDetail>kernel-tools-libs version less than 0:3.10.0-693.21.1.el7</MatchDetail>
				        <UpdateCmd>yum update kernel-tools-libs</UpdateCmd>
				        <Path>/usr/lib64/libcpupower.so.0</Path>
			      </RpmEntityList>
			      <RpmEntityList>
				        <Name>python-perf</Name>
				        <Version>3.10.0</Version>
				        <FullVersion>3.10.0-693.2.2.el7</FullVersion>
				        <MatchDetail>python-perf version less than 0:3.10.0-693.21.1.el7</MatchDetail>
				        <UpdateCmd>yum update python-perf</UpdateCmd>
				        <Path>/usr/lib64/python2.7/site-packages</Path>
			      </RpmEntityList>
			      <OsRelease>7</OsRelease>
		    </ExtendContentJson>
		    <Name>oval:com.redhat.rhsa:def:20180395</Name>
		    <Status>1</Status>
		    <LastTs>1554096622000</LastTs>
		    <NeedReboot>yes</NeedReboot>
		    <AliasName>RHSA-2018:0395-Important: kernel security and bug fix update</AliasName>
		    <Tag>oval</Tag>
		    <IntranetIp>172.19.0.0</IntranetIp>
		    <PrimaryId>160191232</PrimaryId>
		    <Level>low</Level>
		    <InstanceName>master-03-k8s-for-cs-cce881ec0ec77435e8e21bb52d1178e2a</InstanceName>
	  </VulRecords>
    </DescribeVulList>

JSON format

{
	"TotalCount":6430,
	"PageSize":2,
	"RequestId":"ECDE6715-6286-40E6-A32D-3094051FD74D",
	"CurrentPage":1,
	"VulRecords":[
		{
			"Necessity":"asap",
			"Uuid":"04c56617-23fc-43a5-ab9b-755da574ffe8",
			"Ip":"47.99.63.178",
			"ModifyTs":1541347310000,
			"Type":"cve",
			"FirstTs":1541207563000,
			"InstanceId":"i-bp18tnigcymjvmc2fw9e",
			"InternetIp":"47.99.63.178",
			"ResultMessage":"out:Loaded plugins: security\nSetting up Update Process\nResolving Dependencies\n--> Running transaction check\n---> Package gnutls.x86_64 0:2.8.5-14.el6_5 will be updated\n---> Package gnutls.x86_64 0:2.12.23-22.el6 will be an update\n--> Finished Dependency Resolution\n\nDependencies Resolved\n\n================================================================================\n Package         Arch            Version                    Repository     Size\n================================================================================\nUpdating:\n gnutls          x86_64          2.12.23-22.el6             base          389 k\n\nTransaction Summary\n================================================================================\nUpgrade       1 Package(s)\n\nTotal download size: 389 k\nDownloading Packages:\nRunning rpm_check_debug\nRunning Transaction Test\nTransaction Test Succeeded\nRunning Transaction\n\r  Updating   : gnutls-2.12.23-22.el6.x86_64                                 1/2 \n\r  Cleanup    : gnutls-2.8.5-14.el6_5.x86_64                                 2/2 \n\r  Verifying  : gnutls-2.12.23-22.el6.x86_64                                 1/2 \n\r  Verifying  : gnutls-2.8.5-14.el6_5.x86_64                                 2/2 \n\nUpdated:\n  gnutls.x86_64 0:2.12.23-22.el6                                                \n\nComplete! \n\nerr:",
			"Related":"CVE-2016-8610,CVE-2017-5335,CVE-2017-5336,CVE-2017-5337",
			"GroupId":281801,
			"OsVersion":"linux",
			"Name":"oval:com.redhat.rhsa:def:20170574",
			"ExtendContentJson":{
				"Os":"centos",
				"Necessity":{
					"Status":"pending"
				},
				"cveList":[
					"CVE-2016-8610",
					"CVE-2017-5335",
					"CVE-2017-5336",
					"CVE-2017-5337"
				],
				"RpmEntityList":[
					{
						"Name":"gnutls",
						"FullVersion":"2.8.5-14.el6_5",
						"Version":"2.8.5",
						"MatchDetail":"gnutls version less than 0:2.12.23-21.el6",
						"Path":"/usr/lib64/libgnutls-extra.so.26",
						"UpdateCmd":"yum update gnutls"
					}
				],
				"OsRelease":"6"
			},
			"Status":7,
			"LastTs":1541207563000,
			"NeedReboot":"no",
			"AliasName":"RHSA-2017:0574: gnutls security, bug fix, and enhancement update",
			"Tag":"oval",
			"PrimaryId":101162078,
			"IntranetIp":"10.0.0.173",
			"ResultCode":"0",
			"Level":"serious",
			"InstanceName":"Aegis123456789"
		},
		{
			"Necessity":"later",
			"Uuid":"1bfac26f-0301-435e-bcfd-2cdbd271c8a1",
			"Ip":"172.19.220.94",
			"ModifyTs":1554096622000,
			"Type":"cve",
			"FirstTs":1550891785000,
			"InstanceId":"i-uf6iywlcvu7n0v8er15l",
			"InternetIp":"",
			"Related":"CVE-2017-7518,CVE-2017-12188",
			"GroupId":281801,
			"OsVersion":"linux",
			"ExtendContentJson":{
				"Os":"centos",
				"Necessity":{
					"Cvss_factor":"7.8",
					"Status":"normal",
					"Total_score":"7.8",
					"Enviroment_factor":"1.0",
					"Assets_factor":"1",
					"Time_factor":"1.0",
					"Gmt_create":"20190331",
					"Is_calc":"1"
				},
				"cveList":[
					"CVE-2017-7518",
					"CVE-2017-12188"
				],
				"RpmEntityList":[
					{
						"Name":"kernel",
						"FullVersion":"3.10.0-693.2.2.el7",
						"Version":"3.10.0",
						"MatchDetail":"kernel version less than 0:3.10.0-693.21.1.el7",
						"Path":"/boot/.vmlinuz-3.10.0-693.2.2.el7.x86_64.hmac",
						"UpdateCmd":"yum update kernel"
					},
					{
						"Name":"kernel-headers",
						"FullVersion":"3.10.0-693.2.2.el7",
						"Version":"3.10.0",
						"MatchDetail":"kernel-headers version less than 0:3.10.0-693.21.1.el7",
						"Path":"/usr/include/asm",
						"UpdateCmd":"yum update kernel-headers"
					},
					{
						"Name":"kernel-tools",
						"FullVersion":"3.10.0-693.2.2.el7",
						"Version":"3.10.0",
						"MatchDetail":"kernel-tools version less than 0:3.10.0-693.21.1.el7",
						"Path":"/etc/sysconfig/cpupower",
						"UpdateCmd":"yum update kernel-tools"
					},
					{
						"Name":"kernel-tools-libs",
						"FullVersion":"3.10.0-693.2.2.el7",
						"Version":"3.10.0",
						"MatchDetail":"kernel-tools-libs version less than 0:3.10.0-693.21.1.el7",
						"Path":"/usr/lib64/libcpupower.so.0",
						"UpdateCmd":"yum update kernel-tools-libs"
					},
					{
						"Name":"python-perf",
						"FullVersion":"3.10.0-693.2.2.el7",
						"Version":"3.10.0",
						"MatchDetail":"python-perf version less than 0:3.10.0-693.21.1.el7",
						"Path":"/usr/lib64/python2.7/site-packages",
						"UpdateCmd":"yum update python-perf"
					}
				],
				"OsRelease":"7"
			},
			"Name":"oval:com.redhat.rhsa:def:20180395",
			"Status":1,
			"LastTs":1554096622000,
			"NeedReboot":"yes",
			"AliasName":"RHSA-2018:0395-Important: kernel security and bug fix update",
			"Tag":"oval",
			"PrimaryId":160191232,
			"IntranetIp":"172.19.0.0",
			"Level":"low",
			"InstanceName":"master-03-k8s-for-cs-cce881ec0ec77435e8e21bb52d1178e2a"
		}
	]
}

Error codes

For more information about error codes, visit API Error Center.