vDNA API Reference

The vDNA API consists of individual requests and responses, as shown below.

Endpoint WSDL/XSD

API Production (Live) Endpoint
https://www.security-database.com/get_vdna_soapserver.php?wsdl

SOAP Service Endpoints Limitations

Production Web Services API Services Endpoints Queries Limitations
  Free and Business Enterprise
getVDNA() 10 queries / day 30 queries / day

vDNA API Overview

vDNA API Overview by Name

API Purpose
get_vdna Retreive full informations of a specific Alert

vDNA API Overview by Name and Function

API Overview by Name and Function and Service Endpoint

SOAP Name SOAP Request / Response
get_vdna get_vdnaIn
get_vdnaOut

get_vdna

get_vdnaIn is your request to retreive full information for a specific Alert

get_vdnaIn

vDNA API Overview by Field

Element Description Data Type Allowable Values Required
login This is your Security-Database User Login xsd:string See Description Yes
apikey This is your API Key that you can found in your Security-Database User Panel (menu vDNA API) xsd:string 32 single-byte characters Yes
modulekey This is your Module id that you can found in your Security-Database User Panel (menu vDNA API -> modules) xsd:string 32 single-byte characters Yes
vdna This is the vDNA Alert that you want.

it must be a CVE-XXXX-XXXX
xsd:string See Description Yes
base64 Can be use to retreive a Base64 76 Columns instead of string. Prefer Enable Base64 for compatibility (1) xsd:int 1|0 Yes

Example of get_vdnaIn

<soapenv:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
                    xmlns:xsd="http://www.w3.org/2001/XMLSchema" 
                    xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" 
                    xmlns:get="https://www.security-database.com/get_vdna_soapserver.php">
    <soapenv:Header/>
    <soapenv:Body>
        <get:get_vdna soapenv:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/">
            <login xsi:type="xsd:string">testlogin</login>
            <apikey xsi:type="xsd:string">quJzDo7J5VDAouuNFuVvlDu6dAhlvfxS</apikey>
            <vdna xsi:type="xsd:string">CVE-2009-3135</vdna>
            <modulekey xsi:type="xsd:string">9J4rdVutHFmed7a3Kp5JzUZq02W6cQDj</modulekey>
            <base64 xsi:type="xsd:int">0</base64>
        </get:get_vdna>
    </soapenv:Body>
</soapenv:Envelope>

get_vdnaOut

vDNA API Overview by Field
Element Description Data Type Possible Values
return return a complex XML (validation with schema) or Base64 String xsd:string See description

Example of get_vdnaOut

Example of SOAP return. See the third block for the complex XML return with shema validation possibility. Schema available here : http://www.security-database.com/schemas/vdna.xsd

<SOAP-ENV:Envelope xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/" 
                   xmlns:ns1="https://www.security-database.com/get_vdna_soapserver.php" 
                   xmlns:xsd="http://www.w3.org/2001/XMLSchema" 
                   xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
                   xmlns:SOAP-ENC="http://schemas.xmlsoap.org/soap/encoding/" 
                   SOAP-ENV:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/">
    <SOAP-ENV:Body>
        <ns1:get_vdnaCVELast10PublishedResponse>
            <return xsi:type="xsd:string"><![CDATA[<?xml version="1.0" encoding="UTF-8"?>
                    <vdna xmlns="http://www.security-database.com/vdna/1.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.security-database.com/vdna/1.0 http://www.security-database.com/schemas/vdna.xsd">
                            <user_info module_id="65de86d1ksn100df7c42f4f66885d211" date="2012-02-09T15:29:50+01:00"/>
                            <Alert name="CVE-2009-3135" sdcon="Critical" url="http://www.security-database.com/detail.php?alert=CVE-2009-3135" published="2009-11-11" modified="2011-12-13" md5="f76d0aada2d8ed99f31f9ed5019f6395">
                                <CVSS cvss_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)" cvss_version="2" cvss_basescore="9.3" cvss_impactscore="10" cvss_exploitscore="8.6" cvss_attackrange="Network" cvss_attackcomplexity="Medium" cvss_authentification="None Required"/>
                                <CVSS_v3 cvss_vector="CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"/>
                                <Description><![CDATA[Stack-based buffer overflow in Microsoft Office Word 2002 SP3 and 2003 SP3, Office 2004 and 2008 for Mac, Open XML File Format Converter for Mac, 
                                                Office Word Viewer 2003 SP3, and Office Word Viewer allow remote attackers to execute arbitrary code via a Word document with a malformed File Information Block 
                                                (FIB) structure, aka "Microsoft Office Word File Information Memory Corruption Vulnerability."</Description>
                                <Related_alerts>
                                    <Related_alert name="TA09-314A" type="uscert" sdcon="Critical" url="http://www.security-database.com/detail.php?alert=TA09-314A"/>
                                    <Related_alert name="MS09-068" type="ms" sdcon="Critical" url="http://www.security-database.com/detail.php?alert=MS09-068"/>
                                </Related_alerts>
                                <CWEs>
                                    <CWE id="119" source="NVD" name="Failure to Constrain Operations within the Bounds of a Memory Buffer" url="http://www.security-database.com/cwe.php?name=CWE-119"/>
                                </CWEs>
                                <CPEs>
                                    <CPE name="cpe:/a:microsoft:office:2008::mac" url="http://www.security-database.com/cpe.php?detail=cpe:/a:microsoft:office:2008::mac" source="MITRE"/>
                                    <CPE name="cpe:/a:microsoft:office:2004::mac" url="http://www.security-database.com/cpe.php?detail=cpe:/a:microsoft:office:2004::mac" source="MITRE"/>
                                    <CPE name="cpe:/a:microsoft:office_word:2003:sp3" url="http://www.security-database.com/cpe.php?detail=cpe:/a:microsoft:office_word:2003:sp3" source="MITRE"/>
                                    <CPE name="cpe:/a:microsoft:office_word:2002:sp3" url="http://www.security-database.com/cpe.php?detail=cpe:/a:microsoft:office_word:2002:sp3" source="MITRE"/>
                                    <CPE name="cpe:/a:microsoft:office_word_viewer:2003:sp3" url="http://www.security-database.com/cpe.php?detail=cpe:/a:microsoft:office_word_viewer:2003:sp3" source="MITRE"/>
                                    <CPE name="cpe:/a:microsoft:office_word_viewer" url="http://www.security-database.com/cpe.php?detail=cpe:/a:microsoft:office_word_viewer" source="MITRE"/>
                                    <CPE name="cpe:/a:microsoft:open_xml_file_format_converter:::mac" url="http://www.security-database.com/cpe.php?detail=cpe:/a:microsoft:open_xml_file_format_converter:::mac" source="MITRE"/>
                                </CPEs>
                                <OVALs>
                                    <OVAL id="oval:org.mitre.oval:def:6555" source="MITRE" class="vulnerability" name="Microsoft Office Word File Information Memory Corruption Vulnerability" url="http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6555"/>
                                    <OVAL id="oval:org.mitre.oval:def:973" source="MITRE" class="inventory" name="Microsoft Word 2002 is installed" url="http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:973"/>
                                    <OVAL id="oval:org.mitre.oval:def:475" source="MITRE" class="inventory" name="Microsoft Word 2003 is installed" url="http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:475"/>
                                    <OVAL id="oval:org.mitre.oval:def:737" source="MITRE" class="inventory" name="Microsoft Word Viewer is installed" url="http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:737"/>
                                </OVALs>
                                <OSVDBs>
                                    <OSVDB id="59857" source="OSVDB" name="Microsoft Office Word Document Malformed File Information Block (FIB) Parsing Memory Corruption" url="http://osvdb.org/show/osvdb/59857"/>
                                </OSVDBs>
                            </Alert>
                        </vdna>]]>
            </return>
        </ns1:get_vdnaCVELast10PublishedResponse>
    </SOAP-ENV:Body>
</SOAP-ENV:Envelope>

Example of SOAP return in Base64 76 Column. One decode, it's the same as upper

<SOAP-ENV:Envelope xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/" 
                   xmlns:ns1="https://www.security-database.com/get_vdna_soapserver_list.php" 
                   xmlns:xsd="http://www.w3.org/2001/XMLSchema" 
                   xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
                   xmlns:SOAP-ENC="http://schemas.xmlsoap.org/soap/encoding/" 
                   SOAP-ENV:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/">
    <SOAP-ENV:Body>
        <ns1:get_vdnaCVELast10PublishedResponse>
            <return xsi:type="xsd:string">PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz4KPHZkbmEgeG1sbnM9Imh0dHA6
                Ly93d3cuc2VjdXJpdHktZGF0YWJhc2UuY29tL3ZkbmEvMS4wIiB4bWxuczp4c2k9Imh0dHA6Ly93
                d3cudzMub3JnLzIwMDEvWE1MU2NoZW1hLWluc3RhbmNlIiB4c2k6c2NoZW1hTG9jYXRpb249Imh0
                dHA6Ly93d3cuc2VjdXJpdHktZGF0YWJhc2UuY29tL3ZkbmEvMS4wIGh0dHA6Ly93d3cuc2VjdXJp
                dHktZGF0YWJhc2UuY29tL3NjaGVtYXMvdmRuYS54c2QiPgogIDx1c2VyX2luZm8gbW9kdWxlX2lk
                PSI2NWRlODZkMWtzbjEwMGRmN2M0MmY0ZjY2ODg1ZDIxMSIgZGF0ZT0iMjAxMi0wMi0wOVQxNTo0
                MDo1OSswMTowMCIvPgogIDxBbGVydCBuYW1lPSJDVkUtMjAwOS0zMTM1IiBzZGNvbj0iQ3JpdGlj
                YWwiIHVybD0iaHR0cDovL3d3dy5zZWN1cml0eS1kYXRhYmFzZS5jb20vZGV0YWlsLnBocD9hbGVy
                dD1DVkUtMjAwOS0zMTM1IiBwdWJsaXNoZWQ9IjIwMDktMTEtMTEiIG1vZGlmaWVkPSIyMDExLTEy
                LTEzIiBtZDU9ImY3NmQwYWFkYTJkOGVkOTlmMzFmOWVkNTAxOWY2Mzk1Ij4KICAgIDxDVlNTIGN2
                c3NfdmVjdG9yPSIoQVY6Ti9BQzpNL0F1Ok4vQzpDL0k6Qy9BOkMpIiBjdnNzX3ZlcnNpb249IjIi
                IGN2c3NfYmFzZXNjb3JlPSI5LjMiIGN2c3NfaW1wYWN0c2NvcmU9IjEwIiBjdnNzX2V4cGxvaXRz
                Y29yZT0iOC42IiBjdnNzX2F0dGFja3JhbmdlPSJOZXR3b3JrIiBjdnNzX2F0dGFja2NvbXBsZXhp
                dHk9Ik1lZGl1bSIgY3Zzc19hdXRoZW50aWZpY2F0aW9uPSJOb25lIFJlcXVpcmVkIi8+CiAgICA8
                RGVzY3JpcHRpb24+PCFbQ0RBVEFbU3RhY2stYmFzZWQgYnVmZmVyIG92ZXJmbG93IGluIE1pY3Jv
                c29mdCBPZmZpY2UgV29yZCAyMDAyIFNQMyBhbmQgMjAwMyBTUDMsIE9mZmljZSAyMDA0IGFuZCAy
                MDA4IGZvciBNYWMsIE9wZW4gWE1MIEZpbGUgRm9ybWF0IENvbnZlcnRlciBmb3IgTWFjLCBPZmZp
                Y2UgV29yZCBWaWV3ZXIgMjAwMyBTUDMsIGFuZCBPZmZpY2UgV29yZCBWaWV3ZXIgYWxsb3cgcmVt
                b3RlIGF0dGFja2VycyB0byBleGVjdXRlIGFyYml0cmFyeSBjb2RlIHZpYSBhIFdvcmQgZG9jdW1l
                bnQgd2l0aCBhIG1hbGZvcm1lZCBGaWxlIEluZm9ybWF0aW9uIEJsb2NrIChGSUIpIHN0cnVjdHVy
                ZSwgYWthICJNaWNyb3NvZnQgT2ZmaWNlIFdvcmQgRmlsZSBJbmZvcm1hdGlvbiBNZW1vcnkgQ29y
                cnVwdGlvbiBWdWxuZXJhYmlsaXR5LiJdXT48L0Rlc2NyaXB0aW9uPgogICAgPFJlbGF0ZWRfYWxl
                cnRzPgogICAgICA8UmVsYXRlZF9hbGVydCBuYW1lPSJUQTA5LTMxNEEiIHR5cGU9InVzY2VydCIg
                c2Rjb249IkNyaXRpY2FsIiB1cmw9Imh0dHA6Ly93d3cuc2VjdXJpdHktZGF0YWJhc2UuY29tL2Rl
                dGFpbC5waHA/YWxlcnQ9VEEwOS0zMTRBIi8+CiAgICAgIDxSZWxhdGVkX2FsZXJ0IG5hbWU9Ik1T
                MDktMDY4IiB0eXBlPSJtcyIgc2Rjb249IkNyaXRpY2FsIiB1cmw9Imh0dHA6Ly93d3cuc2VjdXJp
                dHktZGF0YWJhc2UuY29tL2RldGFpbC5waHA/YWxlcnQ9TVMwOS0wNjgiLz4KICAgIDwvUmVsYXRl
                ZF9hbGVydHM+CiAgICA8Q1dFcz4KICAgICAgPENXRSBpZD0iMTE5IiBzb3VyY2U9Ik5WRCIgbmFt
                ZT0iRmFpbHVyZSB0byBDb25zdHJhaW4gT3BlcmF0aW9ucyB3aXRoaW4gdGhlIEJvdW5kcyBvZiBh
                IE1lbW9yeSBCdWZmZXIiIHVybD0iaHR0cDovL3d3dy5zZWN1cml0eS1kYXRhYmFzZS5jb20vY3dl
                LnBocD9uYW1lPUNXRS0xMTkiLz4KICAgIDwvQ1dFcz4KICAgIDxDUEVzPgogICAgICA8Q1BFIG5h
                bWU9ImNwZTovYTptaWNyb3NvZnQ6b2ZmaWNlOjIwMDg6Om1hYyIgdXJsPSJodHRwOi8vd3d3LnNl
                Y3VyaXR5LWRhdGFiYXNlLmNvbS9jcGUucGhwP2RldGFpbD1jcGU6L2E6bWljcm9zb2Z0Om9mZmlj
                ZToyMDA4OjptYWMiIHNvdXJjZT0iTUlUUkUiLz4KICAgICAgPENQRSBuYW1lPSJjcGU6L2E6bWlj
                cm9zb2Z0Om9mZmljZToyMDA0OjptYWMiIHVybD0iaHR0cDovL3d3dy5zZWN1cml0eS1kYXRhYmFz
                ZS5jb20vY3BlLnBocD9kZXRhaWw9Y3BlOi9hOm1pY3Jvc29mdDpvZmZpY2U6MjAwNDo6bWFjIiBz
                b3VyY2U9Ik1JVFJFIi8+CiAgICAgIDxDUEUgbmFtZT0iY3BlOi9hOm1pY3Jvc29mdDpvZmZpY2Vf
                d29yZDoyMDAzOnNwMyIgdXJsPSJodHRwOi8vd3d3LnNlY3VyaXR5LWRhdGFiYXNlLmNvbS9jcGUu
                cGhwP2RldGFpbD1jcGU6L2E6bWljcm9zb2Z0Om9mZmljZV93b3JkOjIwMDM6c3AzIiBzb3VyY2U9
                Ik1JVFJFIi8+CiAgICAgIDxDUEUgbmFtZT0iY3BlOi9hOm1pY3Jvc29mdDpvZmZpY2Vfd29yZDoy
                MDAyOnNwMyIgdXJsPSJodHRwOi8vd3d3LnNlY3VyaXR5LWRhdGFiYXNlLmNvbS9jcGUucGhwP2Rl
                dGFpbD1jcGU6L2E6bWljcm9zb2Z0Om9mZmljZV93b3JkOjIwMDI6c3AzIiBzb3VyY2U9Ik1JVFJF
                Ii8+CiAgICAgIDxDUEUgbmFtZT0iY3BlOi9hOm1pY3Jvc29mdDpvZmZpY2Vfd29yZF92aWV3ZXI6
                MjAwMzpzcDMiIHVybD0iaHR0cDovL3d3dy5zZWN1cml0eS1kYXRhYmFzZS5jb20vY3BlLnBocD9k
                ZXRhaWw9Y3BlOi9hOm1pY3Jvc29mdDpvZmZpY2Vfd29yZF92aWV3ZXI6MjAwMzpzcDMiIHNvdXJj
                ZT0iTUlUUkUiLz4KICAgICAgPENQRSBuYW1lPSJjcGU6L2E6bWljcm9zb2Z0Om9mZmljZV93b3Jk
                X3ZpZXdlciIgdXJsPSJodHRwOi8vd3d3LnNlY3VyaXR5LWRhdGFiYXNlLmNvbS9jcGUucGhwP2Rl
                dGFpbD1jcGU6L2E6bWljcm9zb2Z0Om9mZmljZV93b3JkX3ZpZXdlciIgc291cmNlPSJNSVRSRSIv
                PgogICAgICA8Q1BFIG5hbWU9ImNwZTovYTptaWNyb3NvZnQ6b3Blbl94bWxfZmlsZV9mb3JtYXRf
                Y29udmVydGVyOjo6bWFjIiB1cmw9Imh0dHA6Ly93d3cuc2VjdXJpdHktZGF0YWJhc2UuY29tL2Nw
                ZS5waHA/ZGV0YWlsPWNwZTovYTptaWNyb3NvZnQ6b3Blbl94bWxfZmlsZV9mb3JtYXRfY29udmVy
                dGVyOjo6bWFjIiBzb3VyY2U9Ik1JVFJFIi8+CiAgICA8L0NQRXM+CiAgICA8T1ZBTHM+CiAgICAg
                IDxPVkFMIGlkPSJvdmFsOm9yZy5taXRyZS5vdmFsOmRlZjo2NTU1IiBzb3VyY2U9Ik1JVFJFIiBj
                bGFzcz0idnVsbmVyYWJpbGl0eSIgbmFtZT0iTWljcm9zb2Z0IE9mZmljZSBXb3JkIEZpbGUgSW5m
                b3JtYXRpb24gTWVtb3J5IENvcnJ1cHRpb24gVnVsbmVyYWJpbGl0eSIgdXJsPSJodHRwOi8vb3Zh
                bC5taXRyZS5vcmcvcmVwb3NpdG9yeS9kYXRhL2dldERlZj9pZD1vdmFsOm9yZy5taXRyZS5vdmFs
                OmRlZjo2NTU1Ii8+CiAgICAgIDxPVkFMIGlkPSJvdmFsOm9yZy5taXRyZS5vdmFsOmRlZjo5NzMi
                IHNvdXJjZT0iTUlUUkUiIGNsYXNzPSJpbnZlbnRvcnkiIG5hbWU9Ik1pY3Jvc29mdCBXb3JkIDIw
                MDIgaXMgaW5zdGFsbGVkIiB1cmw9Imh0dHA6Ly9vdmFsLm1pdHJlLm9yZy9yZXBvc2l0b3J5L2Rh
                dGEvZ2V0RGVmP2lkPW92YWw6b3JnLm1pdHJlLm92YWw6ZGVmOjk3MyIvPgogICAgICA8T1ZBTCBp
                ZD0ib3ZhbDpvcmcubWl0cmUub3ZhbDpkZWY6NDc1IiBzb3VyY2U9Ik1JVFJFIiBjbGFzcz0iaW52
                ZW50b3J5IiBuYW1lPSJNaWNyb3NvZnQgV29yZCAyMDAzIGlzIGluc3RhbGxlZCIgdXJsPSJodHRw
                Oi8vb3ZhbC5taXRyZS5vcmcvcmVwb3NpdG9yeS9kYXRhL2dldERlZj9pZD1vdmFsOm9yZy5taXRy
                ZS5vdmFsOmRlZjo0NzUiLz4KICAgICAgPE9WQUwgaWQ9Im92YWw6b3JnLm1pdHJlLm92YWw6ZGVm
                OjczNyIgc291cmNlPSJNSVRSRSIgY2xhc3M9ImludmVudG9yeSIgbmFtZT0iTWljcm9zb2Z0IFdv
                cmQgVmlld2VyIGlzIGluc3RhbGxlZCIgdXJsPSJodHRwOi8vb3ZhbC5taXRyZS5vcmcvcmVwb3Np
                dG9yeS9kYXRhL2dldERlZj9pZD1vdmFsOm9yZy5taXRyZS5vdmFsOmRlZjo3MzciLz4KICAgIDwv
                T1ZBTHM+CiAgICA8T1NWREJzPgogICAgICA8T1NWREIgaWQ9IjU5ODU3IiBzb3VyY2U9Ik9TVkRC
                IiBuYW1lPSJNaWNyb3NvZnQgT2ZmaWNlIFdvcmQgRG9jdW1lbnQgTWFsZm9ybWVkIEZpbGUgSW5m
                b3JtYXRpb24gQmxvY2sgKEZJQikgUGFyc2luZyBNZW1vcnkgQ29ycnVwdGlvbiIgdXJsPSJodHRw
                Oi8vb3N2ZGIub3JnL3Nob3cvb3N2ZGIvNTk4NTciLz4KICAgIDwvT1NWREJzPgogIDwvQWxlcnQ+
                CjwvdmRuYT4K
            </return>
        </ns1:get_vdnaCVELast10PublishedResponse>
    </SOAP-ENV:Body>
</SOAP-ENV:Envelope>