tccli 3.0.1088.1__py2.py3-none-any.whl → 3.0.1090.1__py2.py3-none-any.whl

Sign up to get free protection for your applications and to get access to all the features.
Files changed (30) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/examples/ccc/v20200210/DescribeIvrAudioList.md +32 -0
  3. tccli/examples/ccc/v20200210/UploadIvrAudio.md +22 -0
  4. tccli/examples/csip/v20221121/DescribeAssetViewVulRiskList.md +455 -0
  5. tccli/examples/mongodb/v20190725/FlashBackDBInstance.md +29 -0
  6. tccli/examples/ssl/v20191205/DeployCertificateInstance.md +3 -3
  7. tccli/services/bri/v20190328/api.json +2 -2
  8. tccli/services/ccc/ccc_client.py +110 -4
  9. tccli/services/ccc/v20200210/api.json +248 -0
  10. tccli/services/ccc/v20200210/examples.json +16 -0
  11. tccli/services/csip/csip_client.py +53 -0
  12. tccli/services/csip/v20221121/api.json +518 -0
  13. tccli/services/csip/v20221121/examples.json +8 -0
  14. tccli/services/cvm/v20170312/api.json +1 -1
  15. tccli/services/ess/v20201111/api.json +18 -0
  16. tccli/services/essbasic/v20210526/api.json +18 -0
  17. tccli/services/lcic/v20220817/api.json +5 -5
  18. tccli/services/lighthouse/v20200324/api.json +1 -1
  19. tccli/services/live/v20180801/api.json +33 -0
  20. tccli/services/mongodb/mongodb_client.py +67 -14
  21. tccli/services/mongodb/v20190725/api.json +161 -0
  22. tccli/services/mongodb/v20190725/examples.json +8 -0
  23. tccli/services/ssl/v20191205/api.json +11 -2
  24. tccli/services/ssl/v20191205/examples.json +2 -2
  25. tccli/services/vpc/v20170312/api.json +10 -0
  26. {tccli-3.0.1088.1.dist-info → tccli-3.0.1090.1.dist-info}/METADATA +2 -2
  27. {tccli-3.0.1088.1.dist-info → tccli-3.0.1090.1.dist-info}/RECORD +30 -26
  28. {tccli-3.0.1088.1.dist-info → tccli-3.0.1090.1.dist-info}/WHEEL +0 -0
  29. {tccli-3.0.1088.1.dist-info → tccli-3.0.1090.1.dist-info}/entry_points.txt +0 -0
  30. {tccli-3.0.1088.1.dist-info → tccli-3.0.1090.1.dist-info}/license_files/LICENSE +0 -0
@@ -35,6 +35,13 @@
35
35
  "output": "DeleteRiskScanTaskResponse",
36
36
  "status": "online"
37
37
  },
38
+ "DescribeAssetViewVulRiskList": {
39
+ "document": "获取资产视角的漏洞风险列表",
40
+ "input": "DescribeAssetViewVulRiskListRequest",
41
+ "name": "漏洞管理-资产视角的漏洞风险列表",
42
+ "output": "DescribeAssetViewVulRiskListResponse",
43
+ "status": "online"
44
+ },
38
45
  "DescribeCVMAssetInfo": {
39
46
  "document": "cvm详情",
40
47
  "input": "DescribeCVMAssetInfoRequest",
@@ -1703,6 +1710,392 @@
1703
1710
  ],
1704
1711
  "usage": "out"
1705
1712
  },
1713
+ "AssetViewVULRiskData": {
1714
+ "document": "资产视角的漏洞风险对象",
1715
+ "members": [
1716
+ {
1717
+ "disabled": false,
1718
+ "document": "影响资产",
1719
+ "example": "1.1.1.1",
1720
+ "member": "string",
1721
+ "name": "AffectAsset",
1722
+ "output_required": true,
1723
+ "type": "string",
1724
+ "value_allowed_null": false
1725
+ },
1726
+ {
1727
+ "disabled": false,
1728
+ "document": "风险等级,low-低危,high-高危,middle-中危,info-提示,extreme-严重。",
1729
+ "example": "high",
1730
+ "member": "string",
1731
+ "name": "Level",
1732
+ "output_required": true,
1733
+ "type": "string",
1734
+ "value_allowed_null": false
1735
+ },
1736
+ {
1737
+ "disabled": false,
1738
+ "document": "资产类型",
1739
+ "example": "CVM",
1740
+ "member": "string",
1741
+ "name": "InstanceType",
1742
+ "output_required": true,
1743
+ "type": "string",
1744
+ "value_allowed_null": false
1745
+ },
1746
+ {
1747
+ "disabled": false,
1748
+ "document": "组件",
1749
+ "example": "Nginx",
1750
+ "member": "string",
1751
+ "name": "Component",
1752
+ "output_required": true,
1753
+ "type": "string",
1754
+ "value_allowed_null": false
1755
+ },
1756
+ {
1757
+ "disabled": false,
1758
+ "document": "最近识别时间",
1759
+ "example": "2022-10-10 00:00:00",
1760
+ "member": "string",
1761
+ "name": "RecentTime",
1762
+ "output_required": true,
1763
+ "type": "string",
1764
+ "value_allowed_null": false
1765
+ },
1766
+ {
1767
+ "disabled": false,
1768
+ "document": "首次识别时间",
1769
+ "example": "2022-10-10 00:00:00",
1770
+ "member": "string",
1771
+ "name": "FirstTime",
1772
+ "output_required": true,
1773
+ "type": "string",
1774
+ "value_allowed_null": false
1775
+ },
1776
+ {
1777
+ "disabled": false,
1778
+ "document": "状态,0未处理、1标记已处置、2已忽略,3已处置 ,4 处置中 ,5 检测中 ,6部分已处置",
1779
+ "example": "0",
1780
+ "member": "uint64",
1781
+ "name": "Status",
1782
+ "output_required": true,
1783
+ "type": "int",
1784
+ "value_allowed_null": false
1785
+ },
1786
+ {
1787
+ "disabled": false,
1788
+ "document": "风险ID",
1789
+ "example": "dffe78de8b51a46a131fd0d49687ed0a",
1790
+ "member": "string",
1791
+ "name": "RiskId",
1792
+ "output_required": true,
1793
+ "type": "string",
1794
+ "value_allowed_null": false
1795
+ },
1796
+ {
1797
+ "disabled": false,
1798
+ "document": "实例id",
1799
+ "example": "ins-xxx",
1800
+ "member": "string",
1801
+ "name": "InstanceId",
1802
+ "output_required": true,
1803
+ "type": "string",
1804
+ "value_allowed_null": false
1805
+ },
1806
+ {
1807
+ "disabled": false,
1808
+ "document": "实例名",
1809
+ "example": "未命名",
1810
+ "member": "string",
1811
+ "name": "InstanceName",
1812
+ "output_required": true,
1813
+ "type": "string",
1814
+ "value_allowed_null": false
1815
+ },
1816
+ {
1817
+ "disabled": false,
1818
+ "document": "用户appid",
1819
+ "example": "1234",
1820
+ "member": "string",
1821
+ "name": "AppId",
1822
+ "output_required": true,
1823
+ "type": "string",
1824
+ "value_allowed_null": false
1825
+ },
1826
+ {
1827
+ "disabled": false,
1828
+ "document": "用户昵称\n注意:此字段可能返回 null,表示取不到有效值。",
1829
+ "example": "test",
1830
+ "member": "string",
1831
+ "name": "Nick",
1832
+ "output_required": true,
1833
+ "type": "string",
1834
+ "value_allowed_null": true
1835
+ },
1836
+ {
1837
+ "disabled": false,
1838
+ "document": "用户uin\n注意:此字段可能返回 null,表示取不到有效值。",
1839
+ "example": "1234",
1840
+ "member": "string",
1841
+ "name": "Uin",
1842
+ "output_required": true,
1843
+ "type": "string",
1844
+ "value_allowed_null": true
1845
+ },
1846
+ {
1847
+ "disabled": false,
1848
+ "document": "漏洞类型",
1849
+ "example": "命令注入",
1850
+ "member": "string",
1851
+ "name": "VULType",
1852
+ "output_required": true,
1853
+ "type": "string",
1854
+ "value_allowed_null": false
1855
+ },
1856
+ {
1857
+ "disabled": false,
1858
+ "document": "端口",
1859
+ "example": "80",
1860
+ "member": "string",
1861
+ "name": "Port",
1862
+ "output_required": true,
1863
+ "type": "string",
1864
+ "value_allowed_null": false
1865
+ },
1866
+ {
1867
+ "disabled": false,
1868
+ "document": "漏洞影响组件",
1869
+ "example": "OpenSSH",
1870
+ "member": "string",
1871
+ "name": "AppName",
1872
+ "output_required": true,
1873
+ "type": "string",
1874
+ "value_allowed_null": false
1875
+ },
1876
+ {
1877
+ "disabled": false,
1878
+ "document": "漏洞影响版本",
1879
+ "example": "1.0",
1880
+ "member": "string",
1881
+ "name": "AppVersion",
1882
+ "output_required": true,
1883
+ "type": "string",
1884
+ "value_allowed_null": false
1885
+ },
1886
+ {
1887
+ "disabled": false,
1888
+ "document": "风险点",
1889
+ "example": "https://xxxx.com",
1890
+ "member": "string",
1891
+ "name": "VULURL",
1892
+ "output_required": true,
1893
+ "type": "string",
1894
+ "value_allowed_null": false
1895
+ },
1896
+ {
1897
+ "disabled": false,
1898
+ "document": "漏洞名称",
1899
+ "example": "OpenSSH 命令注入漏洞(CVE-2020-15778)",
1900
+ "member": "string",
1901
+ "name": "VULName",
1902
+ "output_required": true,
1903
+ "type": "string",
1904
+ "value_allowed_null": false
1905
+ },
1906
+ {
1907
+ "disabled": false,
1908
+ "document": "cve",
1909
+ "example": "CVE-2016-3115",
1910
+ "member": "string",
1911
+ "name": "CVE",
1912
+ "output_required": true,
1913
+ "type": "string",
1914
+ "value_allowed_null": false
1915
+ },
1916
+ {
1917
+ "disabled": false,
1918
+ "document": "pocid",
1919
+ "example": "c808d8eb0e9c322279c2efa3b82a491c",
1920
+ "member": "string",
1921
+ "name": "POCId",
1922
+ "output_required": true,
1923
+ "type": "string",
1924
+ "value_allowed_null": false
1925
+ },
1926
+ {
1927
+ "disabled": false,
1928
+ "document": "扫描来源",
1929
+ "example": "1",
1930
+ "member": "string",
1931
+ "name": "From",
1932
+ "output_required": true,
1933
+ "type": "string",
1934
+ "value_allowed_null": false
1935
+ },
1936
+ {
1937
+ "disabled": false,
1938
+ "document": "主机版本",
1939
+ "example": "3",
1940
+ "member": "int64",
1941
+ "name": "CWPVersion",
1942
+ "output_required": true,
1943
+ "type": "int",
1944
+ "value_allowed_null": false
1945
+ },
1946
+ {
1947
+ "disabled": false,
1948
+ "document": "实例uuid",
1949
+ "example": "69b75e3e-5601-46e5-9fb9-7f386a757a5d",
1950
+ "member": "string",
1951
+ "name": "InstanceUUID",
1952
+ "output_required": true,
1953
+ "type": "string",
1954
+ "value_allowed_null": false
1955
+ },
1956
+ {
1957
+ "disabled": false,
1958
+ "document": "攻击载荷",
1959
+ "example": "OpenSSH/8.0",
1960
+ "member": "string",
1961
+ "name": "Payload",
1962
+ "output_required": true,
1963
+ "type": "string",
1964
+ "value_allowed_null": false
1965
+ },
1966
+ {
1967
+ "disabled": false,
1968
+ "document": "应急漏洞类型,1-应急漏洞,0-非应急漏洞\n注意:此字段可能返回 null,表示取不到有效值。",
1969
+ "example": "1",
1970
+ "member": "int64",
1971
+ "name": "EMGCVulType",
1972
+ "output_required": true,
1973
+ "type": "int",
1974
+ "value_allowed_null": true
1975
+ },
1976
+ {
1977
+ "disabled": false,
1978
+ "document": "CVSS评分\n注意:此字段可能返回 null,表示取不到有效值。",
1979
+ "example": "8",
1980
+ "member": "float",
1981
+ "name": "CVSS",
1982
+ "output_required": true,
1983
+ "type": "float",
1984
+ "value_allowed_null": true
1985
+ },
1986
+ {
1987
+ "disabled": false,
1988
+ "document": "前端索引id\n注意:此字段可能返回 null,表示取不到有效值。",
1989
+ "example": "78de8b51a46a131fd0d49687ed0a",
1990
+ "member": "string",
1991
+ "name": "Index",
1992
+ "output_required": true,
1993
+ "type": "string",
1994
+ "value_allowed_null": true
1995
+ },
1996
+ {
1997
+ "disabled": false,
1998
+ "document": "pcmgrId\n注意:此字段可能返回 null,表示取不到有效值。",
1999
+ "example": "无",
2000
+ "member": "string",
2001
+ "name": "PCMGRId",
2002
+ "output_required": true,
2003
+ "type": "string",
2004
+ "value_allowed_null": true
2005
+ },
2006
+ {
2007
+ "disabled": false,
2008
+ "document": "报告id\n注意:此字段可能返回 null,表示取不到有效值。",
2009
+ "example": "无",
2010
+ "member": "string",
2011
+ "name": "LogId",
2012
+ "output_required": false,
2013
+ "type": "string",
2014
+ "value_allowed_null": true
2015
+ },
2016
+ {
2017
+ "disabled": false,
2018
+ "document": "任务id\n注意:此字段可能返回 null,表示取不到有效值。",
2019
+ "example": "无",
2020
+ "member": "string",
2021
+ "name": "TaskId",
2022
+ "output_required": false,
2023
+ "type": "string",
2024
+ "value_allowed_null": true
2025
+ },
2026
+ {
2027
+ "disabled": false,
2028
+ "document": "漏洞标签\n注意:此字段可能返回 null,表示取不到有效值。",
2029
+ "example": "必修",
2030
+ "member": "string",
2031
+ "name": "VulTag",
2032
+ "output_required": false,
2033
+ "type": "list",
2034
+ "value_allowed_null": true
2035
+ },
2036
+ {
2037
+ "disabled": false,
2038
+ "document": "漏洞披露时间\n注意:此字段可能返回 null,表示取不到有效值。",
2039
+ "example": "无",
2040
+ "member": "string",
2041
+ "name": "DisclosureTime",
2042
+ "output_required": false,
2043
+ "type": "string",
2044
+ "value_allowed_null": true
2045
+ },
2046
+ {
2047
+ "disabled": false,
2048
+ "document": "攻击热度\n注意:此字段可能返回 null,表示取不到有效值。",
2049
+ "example": "无",
2050
+ "member": "uint64",
2051
+ "name": "AttackHeat",
2052
+ "output_required": false,
2053
+ "type": "int",
2054
+ "value_allowed_null": true
2055
+ },
2056
+ {
2057
+ "disabled": false,
2058
+ "document": "是否必修漏洞1是,0不是\n注意:此字段可能返回 null,表示取不到有效值。",
2059
+ "example": "无",
2060
+ "member": "int64",
2061
+ "name": "IsSuggest",
2062
+ "output_required": false,
2063
+ "type": "int",
2064
+ "value_allowed_null": true
2065
+ },
2066
+ {
2067
+ "disabled": false,
2068
+ "document": "处置任务ID\n注意:此字段可能返回 null,表示取不到有效值。",
2069
+ "example": "无",
2070
+ "member": "string",
2071
+ "name": "HandleTaskId",
2072
+ "output_required": false,
2073
+ "type": "string",
2074
+ "value_allowed_null": true
2075
+ },
2076
+ {
2077
+ "disabled": false,
2078
+ "document": "引擎来源\n注意:此字段可能返回 null,表示取不到有效值。",
2079
+ "example": "nsfocus_vul",
2080
+ "member": "string",
2081
+ "name": "EngineSource",
2082
+ "output_required": false,
2083
+ "type": "string",
2084
+ "value_allowed_null": true
2085
+ },
2086
+ {
2087
+ "disabled": false,
2088
+ "document": "新的漏洞风险id(同全网漏洞表的riskid)\n注意:此字段可能返回 null,表示取不到有效值。",
2089
+ "example": "无",
2090
+ "member": "string",
2091
+ "name": "VulRiskId",
2092
+ "output_required": false,
2093
+ "type": "string",
2094
+ "value_allowed_null": true
2095
+ }
2096
+ ],
2097
+ "usage": "out"
2098
+ },
1706
2099
  "AssetViewWeakPassRisk": {
1707
2100
  "document": "资产视角的弱口令风险",
1708
2101
  "members": [
@@ -3691,6 +4084,131 @@
3691
4084
  ],
3692
4085
  "type": "object"
3693
4086
  },
4087
+ "DescribeAssetViewVulRiskListRequest": {
4088
+ "document": "DescribeAssetViewVulRiskList请求参数结构体",
4089
+ "members": [
4090
+ {
4091
+ "disabled": false,
4092
+ "document": "集团账号的成员id",
4093
+ "example": "[]{\"mem-6wfo0fzks3\",\"mem-85fo0fzks4\"}",
4094
+ "member": "string",
4095
+ "name": "MemberId",
4096
+ "required": false,
4097
+ "type": "list"
4098
+ },
4099
+ {
4100
+ "disabled": false,
4101
+ "document": "过滤内容",
4102
+ "example": "无",
4103
+ "member": "Filter",
4104
+ "name": "Filter",
4105
+ "required": false,
4106
+ "type": "object"
4107
+ },
4108
+ {
4109
+ "disabled": false,
4110
+ "document": "资产标签",
4111
+ "example": "无",
4112
+ "member": "AssetTag",
4113
+ "name": "Tags",
4114
+ "required": false,
4115
+ "type": "list"
4116
+ }
4117
+ ],
4118
+ "type": "object"
4119
+ },
4120
+ "DescribeAssetViewVulRiskListResponse": {
4121
+ "document": "DescribeAssetViewVulRiskList返回参数结构体",
4122
+ "members": [
4123
+ {
4124
+ "disabled": false,
4125
+ "document": "总条数",
4126
+ "example": "10",
4127
+ "member": "int64",
4128
+ "name": "TotalCount",
4129
+ "output_required": true,
4130
+ "type": "int",
4131
+ "value_allowed_null": false
4132
+ },
4133
+ {
4134
+ "disabled": false,
4135
+ "document": "资产视角的漏洞风险列表\n注意:此字段可能返回 null,表示取不到有效值。",
4136
+ "example": "无",
4137
+ "member": "AssetViewVULRiskData",
4138
+ "name": "Data",
4139
+ "output_required": true,
4140
+ "type": "list",
4141
+ "value_allowed_null": true
4142
+ },
4143
+ {
4144
+ "disabled": false,
4145
+ "document": "状态列表",
4146
+ "example": "无",
4147
+ "member": "FilterDataObject",
4148
+ "name": "StatusLists",
4149
+ "output_required": true,
4150
+ "type": "list",
4151
+ "value_allowed_null": false
4152
+ },
4153
+ {
4154
+ "disabled": false,
4155
+ "document": "危险等级列表",
4156
+ "example": "无",
4157
+ "member": "FilterDataObject",
4158
+ "name": "LevelLists",
4159
+ "output_required": true,
4160
+ "type": "list",
4161
+ "value_allowed_null": false
4162
+ },
4163
+ {
4164
+ "disabled": false,
4165
+ "document": "来源列表",
4166
+ "example": "无",
4167
+ "member": "FilterDataObject",
4168
+ "name": "FromLists",
4169
+ "output_required": true,
4170
+ "type": "list",
4171
+ "value_allowed_null": false
4172
+ },
4173
+ {
4174
+ "disabled": false,
4175
+ "document": "漏洞类型列表",
4176
+ "example": "无",
4177
+ "member": "FilterDataObject",
4178
+ "name": "VULTypeLists",
4179
+ "output_required": true,
4180
+ "type": "list",
4181
+ "value_allowed_null": false
4182
+ },
4183
+ {
4184
+ "disabled": false,
4185
+ "document": "资产类型列表",
4186
+ "example": "无",
4187
+ "member": "FilterDataObject",
4188
+ "name": "InstanceTypeLists",
4189
+ "output_required": true,
4190
+ "type": "list",
4191
+ "value_allowed_null": false
4192
+ },
4193
+ {
4194
+ "disabled": false,
4195
+ "document": "tag枚举\n注意:此字段可能返回 null,表示取不到有效值。",
4196
+ "example": "无",
4197
+ "member": "FilterDataObject",
4198
+ "name": "Tags",
4199
+ "output_required": true,
4200
+ "type": "list",
4201
+ "value_allowed_null": true
4202
+ },
4203
+ {
4204
+ "document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
4205
+ "member": "string",
4206
+ "name": "RequestId",
4207
+ "type": "string"
4208
+ }
4209
+ ],
4210
+ "type": "object"
4211
+ },
3694
4212
  "DescribeCVMAssetInfoRequest": {
3695
4213
  "document": "DescribeCVMAssetInfo请求参数结构体",
3696
4214
  "members": [
@@ -40,6 +40,14 @@
40
40
  "title": "删除风险中心扫描任务"
41
41
  }
42
42
  ],
43
+ "DescribeAssetViewVulRiskList": [
44
+ {
45
+ "document": "success1",
46
+ "input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetViewVulRiskList\n<公共请求参数>\n\n{}",
47
+ "output": "{\n \"Response\": {\n \"Data\": [\n {\n \"AffectAsset\": \"182.254.145.158\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"OpenSSH\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2020-15778\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"OpenSSH\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"360bfa2c7c6f118db22f829991424d7a\",\n \"InstanceId\": \"ins-kja8dy5r\",\n \"InstanceName\": \"[autotest][勿删]自动化测试NAT1\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"7bb60327-47de-4bce-b979-57166dc89c72\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"c808d8eb0e9c322279c2efa3b82a491c\",\n \"Payload\": \"OpenSSH/7.4\",\n \"Port\": \"22\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"1498f23a853529b3be8cf554629e4533\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"OpenSSH 命令注入漏洞(CVE-2020-15778)\",\n \"VULType\": \"命令注入\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"42.192.123.209\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"OpenSSH\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2020-15778\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"OpenSSH\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"774b28af351a041b41f246ca43a50b59\",\n \"InstanceId\": \"ins-p1jyrg75\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"bdc338d2-eaaf-4b17-9708-9e9bd26806ae\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"c808d8eb0e9c322279c2efa3b82a491c\",\n \"Payload\": \"OpenSSH/8.0\",\n \"Port\": \"22\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"1498f23a853529b3be8cf554629e4533\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"OpenSSH 命令注入漏洞(CVE-2020-15778)\",\n \"VULType\": \"命令注入\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"81.69.38.139\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"OpenSSH\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2020-15778\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"OpenSSH\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"e1399eb478bb080626419625f762d23e\",\n \"InstanceId\": \"ins-17ye5faf\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"9910883f-ca69-41b8-8f41-6b399b30a053\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"c808d8eb0e9c322279c2efa3b82a491c\",\n \"Payload\": \"OpenSSH/8.0\",\n \"Port\": \"22\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"1498f23a853529b3be8cf554629e4533\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"OpenSSH 命令注入漏洞(CVE-2020-15778)\",\n \"VULType\": \"命令注入\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"42.192.123.209\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"Nginx\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2019-9511\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"Nginx\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"fed411b4775d7f46cd192a45e2877f0b\",\n \"InstanceId\": \"ins-p1jyrg75\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"bdc338d2-eaaf-4b17-9708-9e9bd26806ae\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"654f82856a1f02e61941529f4d7bb642\",\n \"Payload\": \"nginx/1.14.1\",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"28d5b79163e64cd046e6537131ea9e08\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"nginx 安全漏洞(CVE-2019-9511)\",\n \"VULType\": \"其他\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"81.69.38.139\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"Nginx\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2019-9511\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"Nginx\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"3b4a757f4f20274df5afbf45a9fd961b\",\n \"InstanceId\": \"ins-17ye5faf\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"9910883f-ca69-41b8-8f41-6b399b30a053\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"654f82856a1f02e61941529f4d7bb642\",\n \"Payload\": \"nginx/1.14.1\",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"28d5b79163e64cd046e6537131ea9e08\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"nginx 安全漏洞(CVE-2019-9511)\",\n \"VULType\": \"其他\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"42.192.123.209\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"Nginx\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2022-41742\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"Nginx\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"f71a76c67fdfdcfed6164d37a163f3ee\",\n \"InstanceId\": \"ins-p1jyrg75\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"bdc338d2-eaaf-4b17-9708-9e9bd26806ae\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"62fb737e4fcabde555e911e4cab32b6a\",\n \"Payload\": \"nginx/1.14.1\",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"367a544eab01c874b7db69491d78e6d2\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"nginx 越界写入漏洞(CVE-2022-41742)\",\n \"VULType\": \"处理逻辑错误\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"81.69.38.139\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"Nginx\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2022-41742\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"Nginx\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"8b915d789892bf6ecc516f4e98912c39\",\n \"InstanceId\": \"ins-17ye5faf\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"9910883f-ca69-41b8-8f41-6b399b30a053\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"62fb737e4fcabde555e911e4cab32b6a\",\n \"Payload\": \"nginx/1.14.1\",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"367a544eab01c874b7db69491d78e6d2\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"nginx 越界写入漏洞(CVE-2022-41742)\",\n \"VULType\": \"处理逻辑错误\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"42.192.123.209\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"-\",\n \"AppVersion\": \"-\",\n \"CVE\": \"-\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:41:07\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"9f7b3ab47fcf97820bdd1d20cec0f5da\",\n \"InstanceId\": \"ins-p1jyrg75\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"bdc338d2-eaaf-4b17-9708-9e9bd26806ae\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"85fa1a25269ee51318abe17dbd7319be\",\n \"Payload\": \"username:, password:, nlstResult:['pub'] \",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:55:39\",\n \"RiskId\": \"3fd56b7aa90aa2d82dc5a09e16a3dc6c\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"检测到目标FTP服务可匿名访问\",\n \"VULType\": \"未授权访问\",\n \"VULURL\": \"http://42.192.123.209/\"\n },\n {\n \"AffectAsset\": \"42.192.123.209\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"Nginx\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2021-23017\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"Nginx\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"5af1a3e8be94b821f9f88ba1275e0eb1\",\n \"InstanceId\": \"ins-p1jyrg75\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"bdc338d2-eaaf-4b17-9708-9e9bd26806ae\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"b6b554295a36babb8f5dd308ab91e7a0\",\n \"Payload\": \"nginx/1.14.1\",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"4a2c3dfabf00f0f67e2bf6af373eb0d8\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"nginx 安全漏洞(CVE-2021-23017)\",\n \"VULType\": \"其他\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"81.69.38.139\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"Nginx\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2021-23017\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"Nginx\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"5324188b8413cec59971463187276526\",\n \"InstanceId\": \"ins-17ye5faf\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"9910883f-ca69-41b8-8f41-6b399b30a053\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"b6b554295a36babb8f5dd308ab91e7a0\",\n \"Payload\": \"nginx/1.14.1\",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"4a2c3dfabf00f0f67e2bf6af373eb0d8\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"nginx 安全漏洞(CVE-2021-23017)\",\n \"VULType\": \"其他\",\n \"VULURL\": \"\"\n }\n ],\n \"FromLists\": [\n {\n \"Text\": \"云安全中心\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"主机检测\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"容器检测\",\n \"Value\": \"5\"\n }\n ],\n \"InstanceTypeLists\": [\n {\n \"Text\": \"CVM\",\n \"Value\": \"CVM\"\n }\n ],\n \"LevelLists\": [\n {\n \"Text\": \"严重\",\n \"Value\": \"extreme\"\n },\n {\n \"Text\": \"高危\",\n \"Value\": \"high\"\n },\n {\n \"Text\": \"中危\",\n \"Value\": \"middle\"\n },\n {\n \"Text\": \"低危\",\n \"Value\": \"low\"\n },\n {\n \"Text\": \"提示\",\n \"Value\": \"info\"\n }\n ],\n \"RequestId\": \"3c68de67-9f7e-442d-b1f0-81191bd1026e\",\n \"StatusLists\": [\n {\n \"Text\": \"未处理\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"标记已处置\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"已忽略\",\n \"Value\": \"2\"\n },\n {\n \"Text\": \"已修复\",\n \"Value\": \"3\"\n }\n ],\n \"Tags\": [\n {\n \"Text\": \"该漏洞存在在野利用或在野攻击\",\n \"Value\": \"KNOWN_EXPLOITED\"\n },\n {\n \"Text\": \"该漏洞仅能本地利用\",\n \"Value\": \"LOCAL\"\n },\n {\n \"Text\": \"该漏洞可作为系统组件漏洞检出\",\n \"Value\": \"SYS\"\n },\n {\n \"Text\": \"该漏洞可作为应用组件漏洞检出\",\n \"Value\": \"APP\"\n },\n {\n \"Text\": \"应急\",\n \"Value\": \"IS_EMERGENCY\"\n },\n {\n \"Text\": \"该漏洞可以远程利用\",\n \"Value\": \"NETWORK\"\n },\n {\n \"Text\": \"该漏洞有poc\",\n \"Value\": \"POC\"\n },\n {\n \"Text\": \"必修\",\n \"Value\": \"IS_SUGGEST\"\n },\n {\n \"Text\": \"该漏洞有exp\",\n \"Value\": \"EXP\"\n }\n ],\n \"TotalCount\": 1102,\n \"VULTypeLists\": [\n {\n \"Text\": \"处理逻辑错误\",\n \"Value\": \"处理逻辑错误\"\n }\n ]\n }\n}",
48
+ "title": "success1"
49
+ }
50
+ ],
43
51
  "DescribeCVMAssetInfo": [
44
52
  {
45
53
  "document": "接口测试",
@@ -610,7 +610,7 @@
610
610
  "status": "online"
611
611
  },
612
612
  "ResetInstance": {
613
- "document": "本接口 (ResetInstance) 用于重装指定实例上的操作系统。\n\n* 如果指定了`ImageId`参数,则使用指定的镜像重装;否则按照当前实例使用的镜像进行重装。\n* 系统盘将会被格式化,并重置;请确保系统盘中无重要文件。\n* 系统切换时,该实例系统盘`ID`将发生变化,系统盘关联快照将无法回滚、恢复数据。\n* 密码不指定将会通过站内信下发随机密码。\n* 目前只支持[系统盘类型](https://cloud.tencent.com/document/api/213/9452#SystemDisk)是`CLOUD_BASIC`、`CLOUD_PREMIUM`、`CLOUD_SSD`、`CLOUD_BSSD`类型的实例使用该接口实现操作系统切换。\n* 实例操作结果可以通过调用 [DescribeInstances](https://cloud.tencent.com/document/api/213/15728#.E7.A4.BA.E4.BE.8B3-.E6.9F.A5.E8.AF.A2.E5.AE.9E.E4.BE.8B.E7.9A.84.E6.9C.80.E6.96.B0.E6.93.8D.E4.BD.9C.E6.83.85.E5.86.B5) 接口查询,如果实例的最新操作状态(LatestOperationState)为“SUCCESS”,则代表操作成功。",
613
+ "document": "本接口 (ResetInstance) 用于重装指定实例上的操作系统。\n\n* 如果指定了`ImageId`参数,则使用指定的镜像重装;否则按照当前实例使用的镜像进行重装。\n* 系统盘将会被格式化,并重置;请确保系统盘中无重要文件。\n* 密码不指定将会通过站内信下发随机密码。\n* 目前只支持[系统盘类型](https://cloud.tencent.com/document/api/213/9452#SystemDisk)是`CLOUD_BASIC`、`CLOUD_PREMIUM`、`CLOUD_SSD`、`CLOUD_BSSD`类型的实例使用该接口实现操作系统切换。\n* 实例操作结果可以通过调用 [DescribeInstances](https://cloud.tencent.com/document/api/213/15728#.E7.A4.BA.E4.BE.8B3-.E6.9F.A5.E8.AF.A2.E5.AE.9E.E4.BE.8B.E7.9A.84.E6.9C.80.E6.96.B0.E6.93.8D.E4.BD.9C.E6.83.85.E5.86.B5) 接口查询,如果实例的最新操作状态(LatestOperationState)为“SUCCESS”,则代表操作成功。",
614
614
  "input": "ResetInstanceRequest",
615
615
  "name": "重装实例",
616
616
  "output": "ResetInstanceResponse",
@@ -1124,6 +1124,15 @@
1124
1124
  "name": "LicenseType",
1125
1125
  "required": false,
1126
1126
  "type": "int"
1127
+ },
1128
+ {
1129
+ "disabled": false,
1130
+ "document": "开通成功后前端页面跳转的url,此字段的用法场景请联系客户经理确认。\n\n注:`仅支持H5开通场景`, `跳转链接仅支持 https:// , qianapp:// 开头`\n\n跳转场景:\n<ul><li>**贵方H5 -> 腾讯电子签H5 -> 贵方H5** : JumpUrl格式: https://YOUR_CUSTOM_URL/xxxx,只需满足 https:// 开头的正确且合规的网址即可。</li>\n<li>**贵方原生App -> 腾讯电子签H5 -> 贵方原生App** : JumpUrl格式: qianapp://YOUR_CUSTOM_URL,只需满足 qianapp:// 开头的URL即可。`APP实现方,需要拦截Webview地址跳转,发现url是qianapp:// 开头时跳转到原生页面。`APP拦截地址跳转可参考:<a href='https://stackoverflow.com/questions/41693263/android-webview-err-unknown-url-scheme'>Android</a>,<a href='https://razorpay.com/docs/payments/payment-gateway/web-integration/standard/webview/upi-intent-ios/'>IOS</a> </li></ul>\n\n成功结果返回:\n若贵方需要在跳转回时通过链接query参数提示开通成功,JumpUrl中的query应携带如下参数:`appendResult=qian`。这样腾讯电子签H5会在跳转回的url后面会添加query参数提示贵方签署成功,比如 qianapp://YOUR_CUSTOM_URL?action=sign&result=success&from=tencent_ess",
1131
+ "example": "无",
1132
+ "member": "string",
1133
+ "name": "JumpUrl",
1134
+ "required": false,
1135
+ "type": "string"
1127
1136
  }
1128
1137
  ],
1129
1138
  "usage": "in"
@@ -5636,6 +5645,15 @@
5636
5645
  "name": "Agent",
5637
5646
  "required": false,
5638
5647
  "type": "object"
5648
+ },
5649
+ {
5650
+ "disabled": false,
5651
+ "document": "调用方自定义的个性化字段(可自定义此字段的值),并以base64方式编码,支持的最大数据大小为 20480长度。 在个人自动签的开通、关闭等回调信息场景中,该字段的信息将原封不动地透传给贵方。 ",
5652
+ "example": "无",
5653
+ "member": "string",
5654
+ "name": "UserData",
5655
+ "required": false,
5656
+ "type": "string"
5639
5657
  }
5640
5658
  ],
5641
5659
  "type": "object"