All Products
Search
Document Center

Security Center:ModifyVulTargetConfig

Last Updated:May 22, 2025

Configures vulnerability detection for a server.

Debugging

You can run this interface directly in OpenAPI Explorer, saving you the trouble of calculating signatures. After running successfully, OpenAPI Explorer can automatically generate SDK code samples.

Authorization information

There is currently no authorization information disclosed in the API.

Request parameters

ParameterTypeRequiredDescriptionExample
SourceIpstringNo

The source IP address of the request.

1.2.XX.XX
TypestringYes

The type of the vulnerability. Valid values:

  • cve: Linux software vulnerability
  • sys: Windows system vulnerability
  • cms: Web-CMS vulnerability
  • emg: urgent vulnerability
cve
UuidstringYes

The UUID of the server.

inet-7c676676-06fa-442e-90fb-b802e5d6****
ConfigstringYes

Specifies whether to enable vulnerability detection. Valid values:

  • on: yes
  • off: no
off

Response parameters

ParameterTypeDescriptionExample
object
RequestIdstring

The ID of the request, which is used to locate and troubleshoot issues.

1FF908BA-ADD8-5138-8595-614C6E3C6658

Examples

Sample success responses

JSONformat

{
  "RequestId": "1FF908BA-ADD8-5138-8595-614C6E3C6658"
}

Error codes

HTTP status codeError codeError messageDescription
403NoPermissioncaller has no permissionYou are not authorized to do this operation.
500ServerErrorServerError-

For a list of error codes, visit the Service error codes.

Change history

Change timeSummary of changesOperation
No change history