tccli 3.0.1088.1__py2.py3-none-any.whl → 3.0.1090.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of tccli might be problematic. Click here for more details.

Files changed (30) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/examples/ccc/v20200210/DescribeIvrAudioList.md +32 -0
  3. tccli/examples/ccc/v20200210/UploadIvrAudio.md +22 -0
  4. tccli/examples/csip/v20221121/DescribeAssetViewVulRiskList.md +455 -0
  5. tccli/examples/mongodb/v20190725/FlashBackDBInstance.md +29 -0
  6. tccli/examples/ssl/v20191205/DeployCertificateInstance.md +3 -3
  7. tccli/services/bri/v20190328/api.json +2 -2
  8. tccli/services/ccc/ccc_client.py +110 -4
  9. tccli/services/ccc/v20200210/api.json +248 -0
  10. tccli/services/ccc/v20200210/examples.json +16 -0
  11. tccli/services/csip/csip_client.py +53 -0
  12. tccli/services/csip/v20221121/api.json +518 -0
  13. tccli/services/csip/v20221121/examples.json +8 -0
  14. tccli/services/cvm/v20170312/api.json +1 -1
  15. tccli/services/ess/v20201111/api.json +18 -0
  16. tccli/services/essbasic/v20210526/api.json +18 -0
  17. tccli/services/lcic/v20220817/api.json +5 -5
  18. tccli/services/lighthouse/v20200324/api.json +1 -1
  19. tccli/services/live/v20180801/api.json +33 -0
  20. tccli/services/mongodb/mongodb_client.py +67 -14
  21. tccli/services/mongodb/v20190725/api.json +161 -0
  22. tccli/services/mongodb/v20190725/examples.json +8 -0
  23. tccli/services/ssl/v20191205/api.json +11 -2
  24. tccli/services/ssl/v20191205/examples.json +2 -2
  25. tccli/services/vpc/v20170312/api.json +10 -0
  26. {tccli-3.0.1088.1.dist-info → tccli-3.0.1090.1.dist-info}/METADATA +2 -2
  27. {tccli-3.0.1088.1.dist-info → tccli-3.0.1090.1.dist-info}/RECORD +30 -26
  28. {tccli-3.0.1088.1.dist-info → tccli-3.0.1090.1.dist-info}/WHEEL +0 -0
  29. {tccli-3.0.1088.1.dist-info → tccli-3.0.1090.1.dist-info}/entry_points.txt +0 -0
  30. {tccli-3.0.1088.1.dist-info → tccli-3.0.1090.1.dist-info}/license_files/LICENSE +0 -0
@@ -35,6 +35,13 @@
35
35
  "output": "DeleteRiskScanTaskResponse",
36
36
  "status": "online"
37
37
  },
38
+ "DescribeAssetViewVulRiskList": {
39
+ "document": "获取资产视角的漏洞风险列表",
40
+ "input": "DescribeAssetViewVulRiskListRequest",
41
+ "name": "漏洞管理-资产视角的漏洞风险列表",
42
+ "output": "DescribeAssetViewVulRiskListResponse",
43
+ "status": "online"
44
+ },
38
45
  "DescribeCVMAssetInfo": {
39
46
  "document": "cvm详情",
40
47
  "input": "DescribeCVMAssetInfoRequest",
@@ -1703,6 +1710,392 @@
1703
1710
  ],
1704
1711
  "usage": "out"
1705
1712
  },
1713
+ "AssetViewVULRiskData": {
1714
+ "document": "资产视角的漏洞风险对象",
1715
+ "members": [
1716
+ {
1717
+ "disabled": false,
1718
+ "document": "影响资产",
1719
+ "example": "1.1.1.1",
1720
+ "member": "string",
1721
+ "name": "AffectAsset",
1722
+ "output_required": true,
1723
+ "type": "string",
1724
+ "value_allowed_null": false
1725
+ },
1726
+ {
1727
+ "disabled": false,
1728
+ "document": "风险等级,low-低危,high-高危,middle-中危,info-提示,extreme-严重。",
1729
+ "example": "high",
1730
+ "member": "string",
1731
+ "name": "Level",
1732
+ "output_required": true,
1733
+ "type": "string",
1734
+ "value_allowed_null": false
1735
+ },
1736
+ {
1737
+ "disabled": false,
1738
+ "document": "资产类型",
1739
+ "example": "CVM",
1740
+ "member": "string",
1741
+ "name": "InstanceType",
1742
+ "output_required": true,
1743
+ "type": "string",
1744
+ "value_allowed_null": false
1745
+ },
1746
+ {
1747
+ "disabled": false,
1748
+ "document": "组件",
1749
+ "example": "Nginx",
1750
+ "member": "string",
1751
+ "name": "Component",
1752
+ "output_required": true,
1753
+ "type": "string",
1754
+ "value_allowed_null": false
1755
+ },
1756
+ {
1757
+ "disabled": false,
1758
+ "document": "最近识别时间",
1759
+ "example": "2022-10-10 00:00:00",
1760
+ "member": "string",
1761
+ "name": "RecentTime",
1762
+ "output_required": true,
1763
+ "type": "string",
1764
+ "value_allowed_null": false
1765
+ },
1766
+ {
1767
+ "disabled": false,
1768
+ "document": "首次识别时间",
1769
+ "example": "2022-10-10 00:00:00",
1770
+ "member": "string",
1771
+ "name": "FirstTime",
1772
+ "output_required": true,
1773
+ "type": "string",
1774
+ "value_allowed_null": false
1775
+ },
1776
+ {
1777
+ "disabled": false,
1778
+ "document": "状态,0未处理、1标记已处置、2已忽略,3已处置 ,4 处置中 ,5 检测中 ,6部分已处置",
1779
+ "example": "0",
1780
+ "member": "uint64",
1781
+ "name": "Status",
1782
+ "output_required": true,
1783
+ "type": "int",
1784
+ "value_allowed_null": false
1785
+ },
1786
+ {
1787
+ "disabled": false,
1788
+ "document": "风险ID",
1789
+ "example": "dffe78de8b51a46a131fd0d49687ed0a",
1790
+ "member": "string",
1791
+ "name": "RiskId",
1792
+ "output_required": true,
1793
+ "type": "string",
1794
+ "value_allowed_null": false
1795
+ },
1796
+ {
1797
+ "disabled": false,
1798
+ "document": "实例id",
1799
+ "example": "ins-xxx",
1800
+ "member": "string",
1801
+ "name": "InstanceId",
1802
+ "output_required": true,
1803
+ "type": "string",
1804
+ "value_allowed_null": false
1805
+ },
1806
+ {
1807
+ "disabled": false,
1808
+ "document": "实例名",
1809
+ "example": "未命名",
1810
+ "member": "string",
1811
+ "name": "InstanceName",
1812
+ "output_required": true,
1813
+ "type": "string",
1814
+ "value_allowed_null": false
1815
+ },
1816
+ {
1817
+ "disabled": false,
1818
+ "document": "用户appid",
1819
+ "example": "1234",
1820
+ "member": "string",
1821
+ "name": "AppId",
1822
+ "output_required": true,
1823
+ "type": "string",
1824
+ "value_allowed_null": false
1825
+ },
1826
+ {
1827
+ "disabled": false,
1828
+ "document": "用户昵称\n注意:此字段可能返回 null,表示取不到有效值。",
1829
+ "example": "test",
1830
+ "member": "string",
1831
+ "name": "Nick",
1832
+ "output_required": true,
1833
+ "type": "string",
1834
+ "value_allowed_null": true
1835
+ },
1836
+ {
1837
+ "disabled": false,
1838
+ "document": "用户uin\n注意:此字段可能返回 null,表示取不到有效值。",
1839
+ "example": "1234",
1840
+ "member": "string",
1841
+ "name": "Uin",
1842
+ "output_required": true,
1843
+ "type": "string",
1844
+ "value_allowed_null": true
1845
+ },
1846
+ {
1847
+ "disabled": false,
1848
+ "document": "漏洞类型",
1849
+ "example": "命令注入",
1850
+ "member": "string",
1851
+ "name": "VULType",
1852
+ "output_required": true,
1853
+ "type": "string",
1854
+ "value_allowed_null": false
1855
+ },
1856
+ {
1857
+ "disabled": false,
1858
+ "document": "端口",
1859
+ "example": "80",
1860
+ "member": "string",
1861
+ "name": "Port",
1862
+ "output_required": true,
1863
+ "type": "string",
1864
+ "value_allowed_null": false
1865
+ },
1866
+ {
1867
+ "disabled": false,
1868
+ "document": "漏洞影响组件",
1869
+ "example": "OpenSSH",
1870
+ "member": "string",
1871
+ "name": "AppName",
1872
+ "output_required": true,
1873
+ "type": "string",
1874
+ "value_allowed_null": false
1875
+ },
1876
+ {
1877
+ "disabled": false,
1878
+ "document": "漏洞影响版本",
1879
+ "example": "1.0",
1880
+ "member": "string",
1881
+ "name": "AppVersion",
1882
+ "output_required": true,
1883
+ "type": "string",
1884
+ "value_allowed_null": false
1885
+ },
1886
+ {
1887
+ "disabled": false,
1888
+ "document": "风险点",
1889
+ "example": "https://xxxx.com",
1890
+ "member": "string",
1891
+ "name": "VULURL",
1892
+ "output_required": true,
1893
+ "type": "string",
1894
+ "value_allowed_null": false
1895
+ },
1896
+ {
1897
+ "disabled": false,
1898
+ "document": "漏洞名称",
1899
+ "example": "OpenSSH 命令注入漏洞(CVE-2020-15778)",
1900
+ "member": "string",
1901
+ "name": "VULName",
1902
+ "output_required": true,
1903
+ "type": "string",
1904
+ "value_allowed_null": false
1905
+ },
1906
+ {
1907
+ "disabled": false,
1908
+ "document": "cve",
1909
+ "example": "CVE-2016-3115",
1910
+ "member": "string",
1911
+ "name": "CVE",
1912
+ "output_required": true,
1913
+ "type": "string",
1914
+ "value_allowed_null": false
1915
+ },
1916
+ {
1917
+ "disabled": false,
1918
+ "document": "pocid",
1919
+ "example": "c808d8eb0e9c322279c2efa3b82a491c",
1920
+ "member": "string",
1921
+ "name": "POCId",
1922
+ "output_required": true,
1923
+ "type": "string",
1924
+ "value_allowed_null": false
1925
+ },
1926
+ {
1927
+ "disabled": false,
1928
+ "document": "扫描来源",
1929
+ "example": "1",
1930
+ "member": "string",
1931
+ "name": "From",
1932
+ "output_required": true,
1933
+ "type": "string",
1934
+ "value_allowed_null": false
1935
+ },
1936
+ {
1937
+ "disabled": false,
1938
+ "document": "主机版本",
1939
+ "example": "3",
1940
+ "member": "int64",
1941
+ "name": "CWPVersion",
1942
+ "output_required": true,
1943
+ "type": "int",
1944
+ "value_allowed_null": false
1945
+ },
1946
+ {
1947
+ "disabled": false,
1948
+ "document": "实例uuid",
1949
+ "example": "69b75e3e-5601-46e5-9fb9-7f386a757a5d",
1950
+ "member": "string",
1951
+ "name": "InstanceUUID",
1952
+ "output_required": true,
1953
+ "type": "string",
1954
+ "value_allowed_null": false
1955
+ },
1956
+ {
1957
+ "disabled": false,
1958
+ "document": "攻击载荷",
1959
+ "example": "OpenSSH/8.0",
1960
+ "member": "string",
1961
+ "name": "Payload",
1962
+ "output_required": true,
1963
+ "type": "string",
1964
+ "value_allowed_null": false
1965
+ },
1966
+ {
1967
+ "disabled": false,
1968
+ "document": "应急漏洞类型,1-应急漏洞,0-非应急漏洞\n注意:此字段可能返回 null,表示取不到有效值。",
1969
+ "example": "1",
1970
+ "member": "int64",
1971
+ "name": "EMGCVulType",
1972
+ "output_required": true,
1973
+ "type": "int",
1974
+ "value_allowed_null": true
1975
+ },
1976
+ {
1977
+ "disabled": false,
1978
+ "document": "CVSS评分\n注意:此字段可能返回 null,表示取不到有效值。",
1979
+ "example": "8",
1980
+ "member": "float",
1981
+ "name": "CVSS",
1982
+ "output_required": true,
1983
+ "type": "float",
1984
+ "value_allowed_null": true
1985
+ },
1986
+ {
1987
+ "disabled": false,
1988
+ "document": "前端索引id\n注意:此字段可能返回 null,表示取不到有效值。",
1989
+ "example": "78de8b51a46a131fd0d49687ed0a",
1990
+ "member": "string",
1991
+ "name": "Index",
1992
+ "output_required": true,
1993
+ "type": "string",
1994
+ "value_allowed_null": true
1995
+ },
1996
+ {
1997
+ "disabled": false,
1998
+ "document": "pcmgrId\n注意:此字段可能返回 null,表示取不到有效值。",
1999
+ "example": "无",
2000
+ "member": "string",
2001
+ "name": "PCMGRId",
2002
+ "output_required": true,
2003
+ "type": "string",
2004
+ "value_allowed_null": true
2005
+ },
2006
+ {
2007
+ "disabled": false,
2008
+ "document": "报告id\n注意:此字段可能返回 null,表示取不到有效值。",
2009
+ "example": "无",
2010
+ "member": "string",
2011
+ "name": "LogId",
2012
+ "output_required": false,
2013
+ "type": "string",
2014
+ "value_allowed_null": true
2015
+ },
2016
+ {
2017
+ "disabled": false,
2018
+ "document": "任务id\n注意:此字段可能返回 null,表示取不到有效值。",
2019
+ "example": "无",
2020
+ "member": "string",
2021
+ "name": "TaskId",
2022
+ "output_required": false,
2023
+ "type": "string",
2024
+ "value_allowed_null": true
2025
+ },
2026
+ {
2027
+ "disabled": false,
2028
+ "document": "漏洞标签\n注意:此字段可能返回 null,表示取不到有效值。",
2029
+ "example": "必修",
2030
+ "member": "string",
2031
+ "name": "VulTag",
2032
+ "output_required": false,
2033
+ "type": "list",
2034
+ "value_allowed_null": true
2035
+ },
2036
+ {
2037
+ "disabled": false,
2038
+ "document": "漏洞披露时间\n注意:此字段可能返回 null,表示取不到有效值。",
2039
+ "example": "无",
2040
+ "member": "string",
2041
+ "name": "DisclosureTime",
2042
+ "output_required": false,
2043
+ "type": "string",
2044
+ "value_allowed_null": true
2045
+ },
2046
+ {
2047
+ "disabled": false,
2048
+ "document": "攻击热度\n注意:此字段可能返回 null,表示取不到有效值。",
2049
+ "example": "无",
2050
+ "member": "uint64",
2051
+ "name": "AttackHeat",
2052
+ "output_required": false,
2053
+ "type": "int",
2054
+ "value_allowed_null": true
2055
+ },
2056
+ {
2057
+ "disabled": false,
2058
+ "document": "是否必修漏洞1是,0不是\n注意:此字段可能返回 null,表示取不到有效值。",
2059
+ "example": "无",
2060
+ "member": "int64",
2061
+ "name": "IsSuggest",
2062
+ "output_required": false,
2063
+ "type": "int",
2064
+ "value_allowed_null": true
2065
+ },
2066
+ {
2067
+ "disabled": false,
2068
+ "document": "处置任务ID\n注意:此字段可能返回 null,表示取不到有效值。",
2069
+ "example": "无",
2070
+ "member": "string",
2071
+ "name": "HandleTaskId",
2072
+ "output_required": false,
2073
+ "type": "string",
2074
+ "value_allowed_null": true
2075
+ },
2076
+ {
2077
+ "disabled": false,
2078
+ "document": "引擎来源\n注意:此字段可能返回 null,表示取不到有效值。",
2079
+ "example": "nsfocus_vul",
2080
+ "member": "string",
2081
+ "name": "EngineSource",
2082
+ "output_required": false,
2083
+ "type": "string",
2084
+ "value_allowed_null": true
2085
+ },
2086
+ {
2087
+ "disabled": false,
2088
+ "document": "新的漏洞风险id(同全网漏洞表的riskid)\n注意:此字段可能返回 null,表示取不到有效值。",
2089
+ "example": "无",
2090
+ "member": "string",
2091
+ "name": "VulRiskId",
2092
+ "output_required": false,
2093
+ "type": "string",
2094
+ "value_allowed_null": true
2095
+ }
2096
+ ],
2097
+ "usage": "out"
2098
+ },
1706
2099
  "AssetViewWeakPassRisk": {
1707
2100
  "document": "资产视角的弱口令风险",
1708
2101
  "members": [
@@ -3691,6 +4084,131 @@
3691
4084
  ],
3692
4085
  "type": "object"
3693
4086
  },
4087
+ "DescribeAssetViewVulRiskListRequest": {
4088
+ "document": "DescribeAssetViewVulRiskList请求参数结构体",
4089
+ "members": [
4090
+ {
4091
+ "disabled": false,
4092
+ "document": "集团账号的成员id",
4093
+ "example": "[]{\"mem-6wfo0fzks3\",\"mem-85fo0fzks4\"}",
4094
+ "member": "string",
4095
+ "name": "MemberId",
4096
+ "required": false,
4097
+ "type": "list"
4098
+ },
4099
+ {
4100
+ "disabled": false,
4101
+ "document": "过滤内容",
4102
+ "example": "无",
4103
+ "member": "Filter",
4104
+ "name": "Filter",
4105
+ "required": false,
4106
+ "type": "object"
4107
+ },
4108
+ {
4109
+ "disabled": false,
4110
+ "document": "资产标签",
4111
+ "example": "无",
4112
+ "member": "AssetTag",
4113
+ "name": "Tags",
4114
+ "required": false,
4115
+ "type": "list"
4116
+ }
4117
+ ],
4118
+ "type": "object"
4119
+ },
4120
+ "DescribeAssetViewVulRiskListResponse": {
4121
+ "document": "DescribeAssetViewVulRiskList返回参数结构体",
4122
+ "members": [
4123
+ {
4124
+ "disabled": false,
4125
+ "document": "总条数",
4126
+ "example": "10",
4127
+ "member": "int64",
4128
+ "name": "TotalCount",
4129
+ "output_required": true,
4130
+ "type": "int",
4131
+ "value_allowed_null": false
4132
+ },
4133
+ {
4134
+ "disabled": false,
4135
+ "document": "资产视角的漏洞风险列表\n注意:此字段可能返回 null,表示取不到有效值。",
4136
+ "example": "无",
4137
+ "member": "AssetViewVULRiskData",
4138
+ "name": "Data",
4139
+ "output_required": true,
4140
+ "type": "list",
4141
+ "value_allowed_null": true
4142
+ },
4143
+ {
4144
+ "disabled": false,
4145
+ "document": "状态列表",
4146
+ "example": "无",
4147
+ "member": "FilterDataObject",
4148
+ "name": "StatusLists",
4149
+ "output_required": true,
4150
+ "type": "list",
4151
+ "value_allowed_null": false
4152
+ },
4153
+ {
4154
+ "disabled": false,
4155
+ "document": "危险等级列表",
4156
+ "example": "无",
4157
+ "member": "FilterDataObject",
4158
+ "name": "LevelLists",
4159
+ "output_required": true,
4160
+ "type": "list",
4161
+ "value_allowed_null": false
4162
+ },
4163
+ {
4164
+ "disabled": false,
4165
+ "document": "来源列表",
4166
+ "example": "无",
4167
+ "member": "FilterDataObject",
4168
+ "name": "FromLists",
4169
+ "output_required": true,
4170
+ "type": "list",
4171
+ "value_allowed_null": false
4172
+ },
4173
+ {
4174
+ "disabled": false,
4175
+ "document": "漏洞类型列表",
4176
+ "example": "无",
4177
+ "member": "FilterDataObject",
4178
+ "name": "VULTypeLists",
4179
+ "output_required": true,
4180
+ "type": "list",
4181
+ "value_allowed_null": false
4182
+ },
4183
+ {
4184
+ "disabled": false,
4185
+ "document": "资产类型列表",
4186
+ "example": "无",
4187
+ "member": "FilterDataObject",
4188
+ "name": "InstanceTypeLists",
4189
+ "output_required": true,
4190
+ "type": "list",
4191
+ "value_allowed_null": false
4192
+ },
4193
+ {
4194
+ "disabled": false,
4195
+ "document": "tag枚举\n注意:此字段可能返回 null,表示取不到有效值。",
4196
+ "example": "无",
4197
+ "member": "FilterDataObject",
4198
+ "name": "Tags",
4199
+ "output_required": true,
4200
+ "type": "list",
4201
+ "value_allowed_null": true
4202
+ },
4203
+ {
4204
+ "document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
4205
+ "member": "string",
4206
+ "name": "RequestId",
4207
+ "type": "string"
4208
+ }
4209
+ ],
4210
+ "type": "object"
4211
+ },
3694
4212
  "DescribeCVMAssetInfoRequest": {
3695
4213
  "document": "DescribeCVMAssetInfo请求参数结构体",
3696
4214
  "members": [
@@ -40,6 +40,14 @@
40
40
  "title": "删除风险中心扫描任务"
41
41
  }
42
42
  ],
43
+ "DescribeAssetViewVulRiskList": [
44
+ {
45
+ "document": "success1",
46
+ "input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetViewVulRiskList\n<公共请求参数>\n\n{}",
47
+ "output": "{\n \"Response\": {\n \"Data\": [\n {\n \"AffectAsset\": \"182.254.145.158\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"OpenSSH\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2020-15778\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"OpenSSH\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"360bfa2c7c6f118db22f829991424d7a\",\n \"InstanceId\": \"ins-kja8dy5r\",\n \"InstanceName\": \"[autotest][勿删]自动化测试NAT1\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"7bb60327-47de-4bce-b979-57166dc89c72\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"c808d8eb0e9c322279c2efa3b82a491c\",\n \"Payload\": \"OpenSSH/7.4\",\n \"Port\": \"22\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"1498f23a853529b3be8cf554629e4533\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"OpenSSH 命令注入漏洞(CVE-2020-15778)\",\n \"VULType\": \"命令注入\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"42.192.123.209\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"OpenSSH\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2020-15778\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"OpenSSH\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"774b28af351a041b41f246ca43a50b59\",\n \"InstanceId\": \"ins-p1jyrg75\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"bdc338d2-eaaf-4b17-9708-9e9bd26806ae\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"c808d8eb0e9c322279c2efa3b82a491c\",\n \"Payload\": \"OpenSSH/8.0\",\n \"Port\": \"22\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"1498f23a853529b3be8cf554629e4533\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"OpenSSH 命令注入漏洞(CVE-2020-15778)\",\n \"VULType\": \"命令注入\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"81.69.38.139\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"OpenSSH\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2020-15778\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"OpenSSH\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"e1399eb478bb080626419625f762d23e\",\n \"InstanceId\": \"ins-17ye5faf\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"9910883f-ca69-41b8-8f41-6b399b30a053\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"c808d8eb0e9c322279c2efa3b82a491c\",\n \"Payload\": \"OpenSSH/8.0\",\n \"Port\": \"22\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"1498f23a853529b3be8cf554629e4533\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"OpenSSH 命令注入漏洞(CVE-2020-15778)\",\n \"VULType\": \"命令注入\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"42.192.123.209\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"Nginx\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2019-9511\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"Nginx\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"fed411b4775d7f46cd192a45e2877f0b\",\n \"InstanceId\": \"ins-p1jyrg75\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"bdc338d2-eaaf-4b17-9708-9e9bd26806ae\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"654f82856a1f02e61941529f4d7bb642\",\n \"Payload\": \"nginx/1.14.1\",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"28d5b79163e64cd046e6537131ea9e08\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"nginx 安全漏洞(CVE-2019-9511)\",\n \"VULType\": \"其他\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"81.69.38.139\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"Nginx\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2019-9511\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"Nginx\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"3b4a757f4f20274df5afbf45a9fd961b\",\n \"InstanceId\": \"ins-17ye5faf\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"9910883f-ca69-41b8-8f41-6b399b30a053\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"654f82856a1f02e61941529f4d7bb642\",\n \"Payload\": \"nginx/1.14.1\",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"28d5b79163e64cd046e6537131ea9e08\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"nginx 安全漏洞(CVE-2019-9511)\",\n \"VULType\": \"其他\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"42.192.123.209\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"Nginx\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2022-41742\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"Nginx\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"f71a76c67fdfdcfed6164d37a163f3ee\",\n \"InstanceId\": \"ins-p1jyrg75\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"bdc338d2-eaaf-4b17-9708-9e9bd26806ae\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"62fb737e4fcabde555e911e4cab32b6a\",\n \"Payload\": \"nginx/1.14.1\",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"367a544eab01c874b7db69491d78e6d2\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"nginx 越界写入漏洞(CVE-2022-41742)\",\n \"VULType\": \"处理逻辑错误\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"81.69.38.139\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"Nginx\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2022-41742\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"Nginx\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"8b915d789892bf6ecc516f4e98912c39\",\n \"InstanceId\": \"ins-17ye5faf\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"9910883f-ca69-41b8-8f41-6b399b30a053\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"62fb737e4fcabde555e911e4cab32b6a\",\n \"Payload\": \"nginx/1.14.1\",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"367a544eab01c874b7db69491d78e6d2\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"nginx 越界写入漏洞(CVE-2022-41742)\",\n \"VULType\": \"处理逻辑错误\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"42.192.123.209\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"-\",\n \"AppVersion\": \"-\",\n \"CVE\": \"-\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:41:07\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"9f7b3ab47fcf97820bdd1d20cec0f5da\",\n \"InstanceId\": \"ins-p1jyrg75\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"bdc338d2-eaaf-4b17-9708-9e9bd26806ae\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"85fa1a25269ee51318abe17dbd7319be\",\n \"Payload\": \"username:, password:, nlstResult:['pub'] \",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:55:39\",\n \"RiskId\": \"3fd56b7aa90aa2d82dc5a09e16a3dc6c\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"检测到目标FTP服务可匿名访问\",\n \"VULType\": \"未授权访问\",\n \"VULURL\": \"http://42.192.123.209/\"\n },\n {\n \"AffectAsset\": \"42.192.123.209\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"Nginx\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2021-23017\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"Nginx\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"5af1a3e8be94b821f9f88ba1275e0eb1\",\n \"InstanceId\": \"ins-p1jyrg75\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"bdc338d2-eaaf-4b17-9708-9e9bd26806ae\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"b6b554295a36babb8f5dd308ab91e7a0\",\n \"Payload\": \"nginx/1.14.1\",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"4a2c3dfabf00f0f67e2bf6af373eb0d8\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"nginx 安全漏洞(CVE-2021-23017)\",\n \"VULType\": \"其他\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"81.69.38.139\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"Nginx\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2021-23017\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"Nginx\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"5324188b8413cec59971463187276526\",\n \"InstanceId\": \"ins-17ye5faf\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"9910883f-ca69-41b8-8f41-6b399b30a053\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"b6b554295a36babb8f5dd308ab91e7a0\",\n \"Payload\": \"nginx/1.14.1\",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"4a2c3dfabf00f0f67e2bf6af373eb0d8\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"nginx 安全漏洞(CVE-2021-23017)\",\n \"VULType\": \"其他\",\n \"VULURL\": \"\"\n }\n ],\n \"FromLists\": [\n {\n \"Text\": \"云安全中心\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"主机检测\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"容器检测\",\n \"Value\": \"5\"\n }\n ],\n \"InstanceTypeLists\": [\n {\n \"Text\": \"CVM\",\n \"Value\": \"CVM\"\n }\n ],\n \"LevelLists\": [\n {\n \"Text\": \"严重\",\n \"Value\": \"extreme\"\n },\n {\n \"Text\": \"高危\",\n \"Value\": \"high\"\n },\n {\n \"Text\": \"中危\",\n \"Value\": \"middle\"\n },\n {\n \"Text\": \"低危\",\n \"Value\": \"low\"\n },\n {\n \"Text\": \"提示\",\n \"Value\": \"info\"\n }\n ],\n \"RequestId\": \"3c68de67-9f7e-442d-b1f0-81191bd1026e\",\n \"StatusLists\": [\n {\n \"Text\": \"未处理\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"标记已处置\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"已忽略\",\n \"Value\": \"2\"\n },\n {\n \"Text\": \"已修复\",\n \"Value\": \"3\"\n }\n ],\n \"Tags\": [\n {\n \"Text\": \"该漏洞存在在野利用或在野攻击\",\n \"Value\": \"KNOWN_EXPLOITED\"\n },\n {\n \"Text\": \"该漏洞仅能本地利用\",\n \"Value\": \"LOCAL\"\n },\n {\n \"Text\": \"该漏洞可作为系统组件漏洞检出\",\n \"Value\": \"SYS\"\n },\n {\n \"Text\": \"该漏洞可作为应用组件漏洞检出\",\n \"Value\": \"APP\"\n },\n {\n \"Text\": \"应急\",\n \"Value\": \"IS_EMERGENCY\"\n },\n {\n \"Text\": \"该漏洞可以远程利用\",\n \"Value\": \"NETWORK\"\n },\n {\n \"Text\": \"该漏洞有poc\",\n \"Value\": \"POC\"\n },\n {\n \"Text\": \"必修\",\n \"Value\": \"IS_SUGGEST\"\n },\n {\n \"Text\": \"该漏洞有exp\",\n \"Value\": \"EXP\"\n }\n ],\n \"TotalCount\": 1102,\n \"VULTypeLists\": [\n {\n \"Text\": \"处理逻辑错误\",\n \"Value\": \"处理逻辑错误\"\n }\n ]\n }\n}",
48
+ "title": "success1"
49
+ }
50
+ ],
43
51
  "DescribeCVMAssetInfo": [
44
52
  {
45
53
  "document": "接口测试",
@@ -610,7 +610,7 @@
610
610
  "status": "online"
611
611
  },
612
612
  "ResetInstance": {
613
- "document": "本接口 (ResetInstance) 用于重装指定实例上的操作系统。\n\n* 如果指定了`ImageId`参数,则使用指定的镜像重装;否则按照当前实例使用的镜像进行重装。\n* 系统盘将会被格式化,并重置;请确保系统盘中无重要文件。\n* 系统切换时,该实例系统盘`ID`将发生变化,系统盘关联快照将无法回滚、恢复数据。\n* 密码不指定将会通过站内信下发随机密码。\n* 目前只支持[系统盘类型](https://cloud.tencent.com/document/api/213/9452#SystemDisk)是`CLOUD_BASIC`、`CLOUD_PREMIUM`、`CLOUD_SSD`、`CLOUD_BSSD`类型的实例使用该接口实现操作系统切换。\n* 实例操作结果可以通过调用 [DescribeInstances](https://cloud.tencent.com/document/api/213/15728#.E7.A4.BA.E4.BE.8B3-.E6.9F.A5.E8.AF.A2.E5.AE.9E.E4.BE.8B.E7.9A.84.E6.9C.80.E6.96.B0.E6.93.8D.E4.BD.9C.E6.83.85.E5.86.B5) 接口查询,如果实例的最新操作状态(LatestOperationState)为“SUCCESS”,则代表操作成功。",
613
+ "document": "本接口 (ResetInstance) 用于重装指定实例上的操作系统。\n\n* 如果指定了`ImageId`参数,则使用指定的镜像重装;否则按照当前实例使用的镜像进行重装。\n* 系统盘将会被格式化,并重置;请确保系统盘中无重要文件。\n* 密码不指定将会通过站内信下发随机密码。\n* 目前只支持[系统盘类型](https://cloud.tencent.com/document/api/213/9452#SystemDisk)是`CLOUD_BASIC`、`CLOUD_PREMIUM`、`CLOUD_SSD`、`CLOUD_BSSD`类型的实例使用该接口实现操作系统切换。\n* 实例操作结果可以通过调用 [DescribeInstances](https://cloud.tencent.com/document/api/213/15728#.E7.A4.BA.E4.BE.8B3-.E6.9F.A5.E8.AF.A2.E5.AE.9E.E4.BE.8B.E7.9A.84.E6.9C.80.E6.96.B0.E6.93.8D.E4.BD.9C.E6.83.85.E5.86.B5) 接口查询,如果实例的最新操作状态(LatestOperationState)为“SUCCESS”,则代表操作成功。",
614
614
  "input": "ResetInstanceRequest",
615
615
  "name": "重装实例",
616
616
  "output": "ResetInstanceResponse",
@@ -1124,6 +1124,15 @@
1124
1124
  "name": "LicenseType",
1125
1125
  "required": false,
1126
1126
  "type": "int"
1127
+ },
1128
+ {
1129
+ "disabled": false,
1130
+ "document": "开通成功后前端页面跳转的url,此字段的用法场景请联系客户经理确认。\n\n注:`仅支持H5开通场景`, `跳转链接仅支持 https:// , qianapp:// 开头`\n\n跳转场景:\n<ul><li>**贵方H5 -> 腾讯电子签H5 -> 贵方H5** : JumpUrl格式: https://YOUR_CUSTOM_URL/xxxx,只需满足 https:// 开头的正确且合规的网址即可。</li>\n<li>**贵方原生App -> 腾讯电子签H5 -> 贵方原生App** : JumpUrl格式: qianapp://YOUR_CUSTOM_URL,只需满足 qianapp:// 开头的URL即可。`APP实现方,需要拦截Webview地址跳转,发现url是qianapp:// 开头时跳转到原生页面。`APP拦截地址跳转可参考:<a href='https://stackoverflow.com/questions/41693263/android-webview-err-unknown-url-scheme'>Android</a>,<a href='https://razorpay.com/docs/payments/payment-gateway/web-integration/standard/webview/upi-intent-ios/'>IOS</a> </li></ul>\n\n成功结果返回:\n若贵方需要在跳转回时通过链接query参数提示开通成功,JumpUrl中的query应携带如下参数:`appendResult=qian`。这样腾讯电子签H5会在跳转回的url后面会添加query参数提示贵方签署成功,比如 qianapp://YOUR_CUSTOM_URL?action=sign&result=success&from=tencent_ess",
1131
+ "example": "无",
1132
+ "member": "string",
1133
+ "name": "JumpUrl",
1134
+ "required": false,
1135
+ "type": "string"
1127
1136
  }
1128
1137
  ],
1129
1138
  "usage": "in"
@@ -5636,6 +5645,15 @@
5636
5645
  "name": "Agent",
5637
5646
  "required": false,
5638
5647
  "type": "object"
5648
+ },
5649
+ {
5650
+ "disabled": false,
5651
+ "document": "调用方自定义的个性化字段(可自定义此字段的值),并以base64方式编码,支持的最大数据大小为 20480长度。 在个人自动签的开通、关闭等回调信息场景中,该字段的信息将原封不动地透传给贵方。 ",
5652
+ "example": "无",
5653
+ "member": "string",
5654
+ "name": "UserData",
5655
+ "required": false,
5656
+ "type": "string"
5639
5657
  }
5640
5658
  ],
5641
5659
  "type": "object"