查看漏洞详情
下表仅列出该接口特有的请求参数和部分公共参数。更多信息请见公共参数。
参数 | 类型 | 是否必填 | 示例值 | 描述 |
---|---|---|---|---|
Action | String | 是 | GetVulnDetail | 要执行的操作,取值:GetVulnDetail。 |
Version | String | 是 | 2024-05-08 | API的版本,取值:2024-05-08。 |
VulnID | String | 否 | CVE-2019-8457 | 漏洞编号 |
下表仅列出本接口特有的返回参数。更多信息请参见返回结构。
参数 | 类型 | 示例值 | 描述 |
---|---|---|---|
Data | Object | -- | 结果返回 |
POST /?Action=GetVulnDetail&Version=2024-05-08 HTTP/1.1 Host: seccenter.volcengineapi.com Content-Type: application/json; charset=UTF-8 X-Date: 20241120T080538Z X-Content-Sha256: 287e874e******d653b44d21e Authorization: HMAC-SHA256 Credential=Adfks******wekfwe/20241120/cn-beijing/seccenter/request, SignedHeaders=host;x-content-sha256;x-date, Signature=47a7d934ff7b37c03938******cd7b8278a40a1057690c401e92246a0e41085f {"VulnID":"CVE-2019-8457"}
{"ResponseMetadata":{"Action":"api.Action","Region":"cn-beijing","RequestId":"20241120165538010234567890","Service":"seccenter","Version":"apiVersion"},"Result":{"Data":{"AffectPacks":[{"AffectedVersion":"\u003c3.28.0-r0","FixedVersion":"3.28.0-r0","PkgName":"sqlite","Vendor":"alpine 3.16","VendorVulnID":"CVE-2019-8457"}],"CnnvdID":"CNNVD-201905-1097","CveID":"CVE-2019-8457","CvssMetric":[{"Code":"N","Kind":"AV","Name":"网络","Score":4}],"CvssScore":"9.8","CweID":["CWE-125"],"Descrip":"SQLite是xxxxx,攻击者可利用该漏洞导致xxxxxx等。","PublishDate":1559262540,"ReferLink":["http://xxxxx/xxxx.html"],"Remediation":"目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://xxxxx/xxxx.html","Severity":"4","Title":"Sqlite sqlite 越界读取漏洞","VulnID":"CVE-2019-8457","VulnTag":["v_p_poc"],"VulnTagText":["POC已公开"],"VulnType":"越界读取"}}}
下表为您列举了该接口与业务逻辑相关的错误码。公共错误码请参见公共错误码文档。
状态码 | 错误码 | 说明 |
---|---|---|
500 | InternalError | 服务器内部错误 |