Queries the details about a vulnerability.

Debugging

OpenAPI Explorer automatically calculates the signature value. For your convenience, we recommend that you call this operation in OpenAPI Explorer. OpenAPI Explorer dynamically generates the sample code of the operation for different SDKs.

Request parameters

Parameter Type Required Example Description
Action String Yes DescribeVulDetails

The operation that you want to perform. Set the value to DescribeVulDetails.

Name String Yes 5003243

The name of the Redhat Package Manager (RPM) package.

You can call the DescribeVulList operation to obtain the names of RPM packages.

RegionId String Yes cn-hangzhou

The ID of the region.

Type String Yes cve

The type of the vulnerability. Valid values:

  • cve: Linux software vulnerability
  • sys: Windows system vulnerability
Lang String No zh

The natural language of the request and response. Valid values:

  • zh: Chinese
  • en: English
AliasName String No RHSA-2020:1176: avahi security update

The alias of the vulnerability.

Response parameters

Parameter Type Example Description
Cves Array of Cve

Details about the vulnerability.

CveId String CVE-2017-6***

The ID of the vulnerability.

CvssScore String 9.1

The Common Vulnerability Scoring System (CVSS) score of the vulnerability, which indicates the severity of the vulnerability. A larger value indicates a higher severity. Valid values: 0 to 10.

Summary String This update makes quality improvements to the servicing stack, which is the component that installs Windows updates. Servicing stack updates (SSU) ensure that you have a robust and reliable servicing stack so that your devices can receive and install Microsoft updates.

The description of the vulnerability.

Title String 2021-05 servicing stack update for Windows Server 2019 for x64-based systems (KB5003243)

The name of the vulnerability.

RequestId String 484256DA-D816-44D2-9D86-B6EE4D5BA78C

The ID of the request.

Examples

Sample requests

https://ecd.cn-hangzhou.aliyuncs.com/?Action=DescribeVulDetails
&Name=5003243
&RegionId=cn-hangzhou
&Type=cve
&<Common request parameters>

Sample success responses

XML format

<DescribeVulDetailsResponse>
      <Cves>
            <CvssScore>9.1</CvssScore>
            <Summary> This update makes quality improvements to the servicing stack, which is the component that installs Windows updates. Servicing stack updates (SSU) ensure that you have a robust and reliable servicing stack so that your devices can receive and install Microsoft updates. </Summary>
            <Title> 2021-05 servicing stack update for Windows Server 2019 for x64-based systems (KB5003243) </Title>
            <CveId>CVE-2017-6***</CveId>
      </Cves>
      <RequestId>484256DA-D816-44D2-9D86-B6EE4D5BA78C</RequestId>
</DescribeVulDetailsResponse>

JSON format

{
    "Cves": [{
        "CvssScore": "9.1",
        "Summary": "This update makes quality improvements to the servicing stack, which is the component that installs Windows updates. Servicing stack updates (SSU) ensure that you have a robust and reliable servicing stack so that your devices can receive and install Microsoft updates.",
        "Title": "2021-05 servicing stack update for Windows Server 2019 for x64-based systems (KB5003243)",
        "CveId": "CVE-2017-6***"
    }],
    "RequestId": "484256DA-D816-44D2-9D86-B6EE4D5BA78C"
}