Queries the details about the detected vulnerabilities in a workspace.

Debugging

OpenAPI Explorer automatically calculates the signature value. For your convenience, we recommend that you call this operation in OpenAPI Explorer. OpenAPI Explorer dynamically generates the sample code of the operation for different SDKs.

Request parameters

Parameter Type Required Example Description
Action String Yes DescribeVulList

The operation that you want to perform. Set the value to DescribeVulList.

OfficeSiteId String Yes cn-hangzhou+dir-363353****

The ID of the workspace.

RegionId String Yes cn-hangzhou

The ID of the region.

Type String Yes cve

The type of the vulnerability. Valid values:

  • cve: Linux software vulnerability
  • sys: Windows system vulnerability
Lang String No zh

The natural language of the request and response. Valid values:

  • zh: Chinese
  • en: English
Necessity String No asap

The priority to fix the vulnerability or the risk level of the vulnerability. Valid values:

  • asap: high
  • later: medium
  • nntf: low
AliasName String No RHSA-2019:0230-Important: polkit security update

The alias of the vulnerability.

Dealed String No n

The status of the vulnerability. Valid values:

  • y: processed
  • n: not processed
CurrentPage Integer No 1

The number of the page to return.

Pages start from page 1.

Default value: 1.

PageSize Integer No 20

The maximum number of entries to return on each page.

Default value: 20.

Response parameters

Parameter Type Example Description
CurrentPage Integer 1

The page number of the returned page.

PageSize Integer 20

The maximum number of entries returned per page.

RequestId String 0AC407AC-A010-45B4-ADD8-CDC679D3DF26

The ID of the request.

TotalCount Integer 1

The total number of entries returned.

VulRecords Array of VulRecord

Details about vulnerabilities.

AliasName String 2021-05 servicing stack update for Windows Server 2019 for x64-based systems (KB5003243)

The name of the vulnerability.

DesktopId String ecd-9qocyzzbmi4pl****

The ID of the affected cloud desktop.

DesktopName String test

The name of the affected cloud desktop.

ExtendContentJson Struct

The extended information of the vulnerability.

RpmEntityList Array of RpmEntity

Details about RPM packages.

FullVersion String 3.10.0-693.2.2.el7

The complete version number of the RPM package.

MatchDetail String python-perf version less than 0:3.10.0-693.21.1.el7

The detailed matching information of the vulnerability.

Name String python-perf

The name of the RPM package.

Path String /usr/lib64/python2.7/site-packages

The path of the software that has the vulnerability.

UpdateCmd String *** update python-perf

The command used to fix the vulnerability.

FirstTs Long 1620875711000

The timestamp when the vulnerability was first detected. The timestamp follows the UNIX time format. It is the number of milliseconds that have elapsed since 00:00:00 Thursday, January 1, 1970.

LastTs Long 1621292382000

The timestamp when the vulnerability was last detected. The timestamp follows the UNIX time format. It is the number of milliseconds that have elapsed since 00:00:00 Thursday, January 1, 1970.

ModifyTs Long 1621292382000

The timestamp when the vulnerability status was modified. The timestamp follows the UNIX time format. It is the number of milliseconds that have elapsed since 00:00:00 Thursday, January 1, 1970.

Name String 5003243

The name of the vulnerability.

Necessity String asap

The priority to fix the vulnerability or the risk level of the vulnerability. Valid values:

  • asap: high
  • later: medium
  • nntf: low
Online Boolean true

Indicates whether the Security Center agent on the cloud desktops is online. Valid values:

  • true: online
  • false: offline
OsVersion String win

The name of the operating system of the cloud desktop.

Related String ACSV-SYS-5003243

The IDs of Common Vulnerabilities and Exposures (CVEs) related to the vulnerability.

RepairTs Long 1621315382000

The timestamp when the vulnerability was fixed. The timestamp follows the UNIX time format. It is the number of milliseconds that have elapsed since 00:00:00 Thursday, January 1, 1970.

ResultCode String 0

The code returned after the vulnerability is fixed.

ResultMessage String timeout

The message returned after the vulnerability is fixed.

Status Integer 1

The status of the vulnerability. Valid values:

  • 1: unfixed
  • 2: fix failed
  • 3: rollback failed
  • 4: fixing
  • 5: rolling back
  • 6: verifying
  • 7: fixed
  • 8: fixed and pending restart
  • 9: rolled back
  • 10: ignored
  • 11: rolled back and pending restart
  • 12: not found
  • 20: expired
Tag String system

The tag of the vulnerability.

Type String sys

The type of the vulnerability. Valid values:

  • cve: Linux software vulnerability
  • sys: Windows system vulnerability

Examples

Sample requests

https://ecd.cn-hangzhou.aliyuncs.com/?Action=DescribeVulList
&OfficeSiteId=cn-hangzhou+dir-363353****
&RegionId=cn-hangzhou
&<Common request parameters>

Sample success responses

XML format

<DescribeVulListResponse>
      <TotalCount>1</TotalCount>
      <PageSize>20</PageSize>
      <RequestId>0AC407AC-A010-45B4-ADD8-CDC679D3DF26</RequestId>
      <VulRecords>
            <Status>1</Status>
            <OsVersion>win</OsVersion>
            <DesktopName>test</DesktopName>
            <Necessity>asap</Necessity>
            <LastTs>1621292382000</LastTs>
            <DesktopId>ecd-9qocyzzbmi4pl****</DesktopId>
            <ResultMessage>timeout</ResultMessage>
            <Name>5003243</Name>
            <RepairTs>1621315382000</RepairTs>
            <FirstTs>1620875711000</FirstTs>
            <Type>sys</Type>
            <Related>"ACSV-SYS-5003243</Related>
            <ModifyTs>1621292382000</ModifyTs>
            <AliasName> 2021-05 servicing stack update for Windows Server 2019 for x64-based systems (KB5003243) </AliasName>
            <Tag>system</Tag>
            <Online>true</Online>
            <ResultCode>0</ResultCode>
            <ExtendContentJson>
                  <RpmEntityList>
                        <Path>/usr/lib64/python2.7/site-packages</Path>
                        <UpdateCmd>*** update python-perf</UpdateCmd>
                        <FullVersion>3.10.0-693.2.2.el7</FullVersion>
                        <MatchDetail>python-perf version less than 0:3.10.0-693.21.1.el7</MatchDetail>
                        <Name>python-perf</Name>
                  </RpmEntityList>
            </ExtendContentJson>
      </VulRecords>
      <CurrentPage>1</CurrentPage>
</DescribeVulListResponse>

JSON format

{
    "TotalCount": "1",
    "PageSize": "20",
    "RequestId": "0AC407AC-A010-45B4-ADD8-CDC679D3DF26",
    "VulRecords": [{
        "Status": "1",
        "OsVersion": "win",
        "DesktopName": "test",
        "Necessity": "asap",
        "LastTs": "1621292382000",
        "DesktopId": "ecd-9qocyzzbmi4pl****",
        "ResultMessage": "timeout",
        "Name": "5003243",
        "RepairTs": "1621315382000",
        "FirstTs": "1620875711000",
        "Type": "sys",
        "Related": "\"ACSV-SYS-5003243",
        "ModifyTs": "1621292382000",
        "AliasName": "2021-05 servicing stack update for Windows Server 2019 for x64-based systems (KB5003243)"
        "Tag": "system",
        "Online": "true",
        "ResultCode": "0",
        "ExtendContentJson": {
            "RpmEntityList": [{
                "Path": "/usr/lib64/python2.7/site-packages",
                "UpdateCmd": "*** update python-perf",
                "FullVersion": "3.10.0-693.2.2.el7",
                "MatchDetail": "python-perf version less than 0:3.10.0-693.21.1.el7",
                "Name": "python-perf"
            }]
        }
    }],
    "CurrentPage": "1"
}