vDNA API Reference
The vDNA API consists of individual requests and responses, as shown below.
Endpoint WSDL/XSD
API Production (Live) Endpoint |
---|
https://www.security-database.com/get_vdna_soapserver.php?wsdl |
SOAP Service Endpoints Limitations
Production Web Services API Services Endpoints Queries Limitations | ||
---|---|---|
Free and Business | Enterprise | |
getVDNA() | 10 queries / day | 30 queries / day |
vDNA API Overview
vDNA API Overview by Name
API | Purpose |
---|---|
get_vdna | Retreive full informations of a specific Alert |
vDNA API Overview by Name and Function
API Overview by Name and Function and Service Endpoint
SOAP Name | SOAP Request / Response |
---|---|
get_vdna | get_vdnaIn get_vdnaOut |
get_vdna
get_vdnaIn is your request to retreive full information for a specific Alert
get_vdnaIn
vDNA API Overview by Field
Element | Description | Data Type | Allowable Values | Required |
---|---|---|---|---|
login | This is your Security-Database User Login | xsd:string | See Description | Yes |
apikey | This is your API Key that you can found in your Security-Database User Panel (menu vDNA API) | xsd:string | 32 single-byte characters | Yes |
modulekey | This is your Module id that you can found in your Security-Database User Panel (menu vDNA API -> modules) | xsd:string | 32 single-byte characters | Yes |
vdna | This is the vDNA Alert that you want. it must be a CVE-XXXX-XXXX | xsd:string | See Description | Yes |
base64 | Can be use to retreive a Base64 76 Columns instead of string. Prefer Enable Base64 for compatibility (1) | xsd:int | 1|0 | Yes |
Example of get_vdnaIn
<soapenv:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:get="https://www.security-database.com/get_vdna_soapserver.php"> <soapenv:Header/> <soapenv:Body> <get:get_vdna soapenv:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"> <login xsi:type="xsd:string">testlogin</login> <apikey xsi:type="xsd:string">quJzDo7J5VDAouuNFuVvlDu6dAhlvfxS</apikey> <vdna xsi:type="xsd:string">CVE-2009-3135</vdna> <modulekey xsi:type="xsd:string">9J4rdVutHFmed7a3Kp5JzUZq02W6cQDj</modulekey> <base64 xsi:type="xsd:int">0</base64> </get:get_vdna> </soapenv:Body> </soapenv:Envelope>
get_vdnaOut
vDNA API Overview by Field | |||
Element | Description | Data Type | Possible Values |
---|---|---|---|
return | return a complex XML (validation with schema) or Base64 String | xsd:string | See description |
Example of get_vdnaOut
Example of SOAP return. See the third block for the complex XML return with shema validation possibility. Schema available here : http://www.security-database.com/schemas/vdna.xsd
<SOAP-ENV:Envelope xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/" xmlns:ns1="https://www.security-database.com/get_vdna_soapserver.php" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:SOAP-ENC="http://schemas.xmlsoap.org/soap/encoding/" SOAP-ENV:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"> <SOAP-ENV:Body> <ns1:get_vdnaCVELast10PublishedResponse> <return xsi:type="xsd:string"><![CDATA[<?xml version="1.0" encoding="UTF-8"?> <vdna xmlns="http://www.security-database.com/vdna/1.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.security-database.com/vdna/1.0 http://www.security-database.com/schemas/vdna.xsd"> <user_info module_id="65de86d1ksn100df7c42f4f66885d211" date="2012-02-09T15:29:50+01:00"/> <Alert name="CVE-2009-3135" sdcon="Critical" url="http://www.security-database.com/detail.php?alert=CVE-2009-3135" published="2009-11-11" modified="2011-12-13" md5="f76d0aada2d8ed99f31f9ed5019f6395"> <CVSS cvss_vector="(AV:N/AC:M/Au:N/C:C/I:C/A:C)" cvss_version="2" cvss_basescore="9.3" cvss_impactscore="10" cvss_exploitscore="8.6" cvss_attackrange="Network" cvss_attackcomplexity="Medium" cvss_authentification="None Required"/> <CVSS_v3 cvss_vector="CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"/> <Description><![CDATA[Stack-based buffer overflow in Microsoft Office Word 2002 SP3 and 2003 SP3, Office 2004 and 2008 for Mac, Open XML File Format Converter for Mac, Office Word Viewer 2003 SP3, and Office Word Viewer allow remote attackers to execute arbitrary code via a Word document with a malformed File Information Block (FIB) structure, aka "Microsoft Office Word File Information Memory Corruption Vulnerability."</Description> <Related_alerts> <Related_alert name="TA09-314A" type="uscert" sdcon="Critical" url="http://www.security-database.com/detail.php?alert=TA09-314A"/> <Related_alert name="MS09-068" type="ms" sdcon="Critical" url="http://www.security-database.com/detail.php?alert=MS09-068"/> </Related_alerts> <CWEs> <CWE id="119" source="NVD" name="Failure to Constrain Operations within the Bounds of a Memory Buffer" url="http://www.security-database.com/cwe.php?name=CWE-119"/> </CWEs> <CPEs> <CPE name="cpe:/a:microsoft:office:2008::mac" url="http://www.security-database.com/cpe.php?detail=cpe:/a:microsoft:office:2008::mac" source="MITRE"/> <CPE name="cpe:/a:microsoft:office:2004::mac" url="http://www.security-database.com/cpe.php?detail=cpe:/a:microsoft:office:2004::mac" source="MITRE"/> <CPE name="cpe:/a:microsoft:office_word:2003:sp3" url="http://www.security-database.com/cpe.php?detail=cpe:/a:microsoft:office_word:2003:sp3" source="MITRE"/> <CPE name="cpe:/a:microsoft:office_word:2002:sp3" url="http://www.security-database.com/cpe.php?detail=cpe:/a:microsoft:office_word:2002:sp3" source="MITRE"/> <CPE name="cpe:/a:microsoft:office_word_viewer:2003:sp3" url="http://www.security-database.com/cpe.php?detail=cpe:/a:microsoft:office_word_viewer:2003:sp3" source="MITRE"/> <CPE name="cpe:/a:microsoft:office_word_viewer" url="http://www.security-database.com/cpe.php?detail=cpe:/a:microsoft:office_word_viewer" source="MITRE"/> <CPE name="cpe:/a:microsoft:open_xml_file_format_converter:::mac" url="http://www.security-database.com/cpe.php?detail=cpe:/a:microsoft:open_xml_file_format_converter:::mac" source="MITRE"/> </CPEs> <OVALs> <OVAL id="oval:org.mitre.oval:def:6555" source="MITRE" class="vulnerability" name="Microsoft Office Word File Information Memory Corruption Vulnerability" url="http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6555"/> <OVAL id="oval:org.mitre.oval:def:973" source="MITRE" class="inventory" name="Microsoft Word 2002 is installed" url="http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:973"/> <OVAL id="oval:org.mitre.oval:def:475" source="MITRE" class="inventory" name="Microsoft Word 2003 is installed" url="http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:475"/> <OVAL id="oval:org.mitre.oval:def:737" source="MITRE" class="inventory" name="Microsoft Word Viewer is installed" url="http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:737"/> </OVALs> <OSVDBs> <OSVDB id="59857" source="OSVDB" name="Microsoft Office Word Document Malformed File Information Block (FIB) Parsing Memory Corruption" url="http://osvdb.org/show/osvdb/59857"/> </OSVDBs> </Alert> </vdna>]]> </return> </ns1:get_vdnaCVELast10PublishedResponse> </SOAP-ENV:Body> </SOAP-ENV:Envelope>
Example of SOAP return in Base64 76 Column. One decode, it's the same as upper
<SOAP-ENV:Envelope xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/" xmlns:ns1="https://www.security-database.com/get_vdna_soapserver_list.php" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:SOAP-ENC="http://schemas.xmlsoap.org/soap/encoding/" SOAP-ENV:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"> <SOAP-ENV:Body> <ns1:get_vdnaCVELast10PublishedResponse> <return xsi:type="xsd:string">PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz4KPHZkbmEgeG1sbnM9Imh0dHA6 Ly93d3cuc2VjdXJpdHktZGF0YWJhc2UuY29tL3ZkbmEvMS4wIiB4bWxuczp4c2k9Imh0dHA6Ly93 d3cudzMub3JnLzIwMDEvWE1MU2NoZW1hLWluc3RhbmNlIiB4c2k6c2NoZW1hTG9jYXRpb249Imh0 dHA6Ly93d3cuc2VjdXJpdHktZGF0YWJhc2UuY29tL3ZkbmEvMS4wIGh0dHA6Ly93d3cuc2VjdXJp dHktZGF0YWJhc2UuY29tL3NjaGVtYXMvdmRuYS54c2QiPgogIDx1c2VyX2luZm8gbW9kdWxlX2lk PSI2NWRlODZkMWtzbjEwMGRmN2M0MmY0ZjY2ODg1ZDIxMSIgZGF0ZT0iMjAxMi0wMi0wOVQxNTo0 MDo1OSswMTowMCIvPgogIDxBbGVydCBuYW1lPSJDVkUtMjAwOS0zMTM1IiBzZGNvbj0iQ3JpdGlj YWwiIHVybD0iaHR0cDovL3d3dy5zZWN1cml0eS1kYXRhYmFzZS5jb20vZGV0YWlsLnBocD9hbGVy dD1DVkUtMjAwOS0zMTM1IiBwdWJsaXNoZWQ9IjIwMDktMTEtMTEiIG1vZGlmaWVkPSIyMDExLTEy LTEzIiBtZDU9ImY3NmQwYWFkYTJkOGVkOTlmMzFmOWVkNTAxOWY2Mzk1Ij4KICAgIDxDVlNTIGN2 c3NfdmVjdG9yPSIoQVY6Ti9BQzpNL0F1Ok4vQzpDL0k6Qy9BOkMpIiBjdnNzX3ZlcnNpb249IjIi IGN2c3NfYmFzZXNjb3JlPSI5LjMiIGN2c3NfaW1wYWN0c2NvcmU9IjEwIiBjdnNzX2V4cGxvaXRz Y29yZT0iOC42IiBjdnNzX2F0dGFja3JhbmdlPSJOZXR3b3JrIiBjdnNzX2F0dGFja2NvbXBsZXhp dHk9Ik1lZGl1bSIgY3Zzc19hdXRoZW50aWZpY2F0aW9uPSJOb25lIFJlcXVpcmVkIi8+CiAgICA8 RGVzY3JpcHRpb24+PCFbQ0RBVEFbU3RhY2stYmFzZWQgYnVmZmVyIG92ZXJmbG93IGluIE1pY3Jv c29mdCBPZmZpY2UgV29yZCAyMDAyIFNQMyBhbmQgMjAwMyBTUDMsIE9mZmljZSAyMDA0IGFuZCAy MDA4IGZvciBNYWMsIE9wZW4gWE1MIEZpbGUgRm9ybWF0IENvbnZlcnRlciBmb3IgTWFjLCBPZmZp Y2UgV29yZCBWaWV3ZXIgMjAwMyBTUDMsIGFuZCBPZmZpY2UgV29yZCBWaWV3ZXIgYWxsb3cgcmVt b3RlIGF0dGFja2VycyB0byBleGVjdXRlIGFyYml0cmFyeSBjb2RlIHZpYSBhIFdvcmQgZG9jdW1l bnQgd2l0aCBhIG1hbGZvcm1lZCBGaWxlIEluZm9ybWF0aW9uIEJsb2NrIChGSUIpIHN0cnVjdHVy ZSwgYWthICJNaWNyb3NvZnQgT2ZmaWNlIFdvcmQgRmlsZSBJbmZvcm1hdGlvbiBNZW1vcnkgQ29y cnVwdGlvbiBWdWxuZXJhYmlsaXR5LiJdXT48L0Rlc2NyaXB0aW9uPgogICAgPFJlbGF0ZWRfYWxl cnRzPgogICAgICA8UmVsYXRlZF9hbGVydCBuYW1lPSJUQTA5LTMxNEEiIHR5cGU9InVzY2VydCIg c2Rjb249IkNyaXRpY2FsIiB1cmw9Imh0dHA6Ly93d3cuc2VjdXJpdHktZGF0YWJhc2UuY29tL2Rl dGFpbC5waHA/YWxlcnQ9VEEwOS0zMTRBIi8+CiAgICAgIDxSZWxhdGVkX2FsZXJ0IG5hbWU9Ik1T MDktMDY4IiB0eXBlPSJtcyIgc2Rjb249IkNyaXRpY2FsIiB1cmw9Imh0dHA6Ly93d3cuc2VjdXJp dHktZGF0YWJhc2UuY29tL2RldGFpbC5waHA/YWxlcnQ9TVMwOS0wNjgiLz4KICAgIDwvUmVsYXRl ZF9hbGVydHM+CiAgICA8Q1dFcz4KICAgICAgPENXRSBpZD0iMTE5IiBzb3VyY2U9Ik5WRCIgbmFt ZT0iRmFpbHVyZSB0byBDb25zdHJhaW4gT3BlcmF0aW9ucyB3aXRoaW4gdGhlIEJvdW5kcyBvZiBh IE1lbW9yeSBCdWZmZXIiIHVybD0iaHR0cDovL3d3dy5zZWN1cml0eS1kYXRhYmFzZS5jb20vY3dl LnBocD9uYW1lPUNXRS0xMTkiLz4KICAgIDwvQ1dFcz4KICAgIDxDUEVzPgogICAgICA8Q1BFIG5h bWU9ImNwZTovYTptaWNyb3NvZnQ6b2ZmaWNlOjIwMDg6Om1hYyIgdXJsPSJodHRwOi8vd3d3LnNl Y3VyaXR5LWRhdGFiYXNlLmNvbS9jcGUucGhwP2RldGFpbD1jcGU6L2E6bWljcm9zb2Z0Om9mZmlj ZToyMDA4OjptYWMiIHNvdXJjZT0iTUlUUkUiLz4KICAgICAgPENQRSBuYW1lPSJjcGU6L2E6bWlj cm9zb2Z0Om9mZmljZToyMDA0OjptYWMiIHVybD0iaHR0cDovL3d3dy5zZWN1cml0eS1kYXRhYmFz ZS5jb20vY3BlLnBocD9kZXRhaWw9Y3BlOi9hOm1pY3Jvc29mdDpvZmZpY2U6MjAwNDo6bWFjIiBz b3VyY2U9Ik1JVFJFIi8+CiAgICAgIDxDUEUgbmFtZT0iY3BlOi9hOm1pY3Jvc29mdDpvZmZpY2Vf d29yZDoyMDAzOnNwMyIgdXJsPSJodHRwOi8vd3d3LnNlY3VyaXR5LWRhdGFiYXNlLmNvbS9jcGUu cGhwP2RldGFpbD1jcGU6L2E6bWljcm9zb2Z0Om9mZmljZV93b3JkOjIwMDM6c3AzIiBzb3VyY2U9 Ik1JVFJFIi8+CiAgICAgIDxDUEUgbmFtZT0iY3BlOi9hOm1pY3Jvc29mdDpvZmZpY2Vfd29yZDoy MDAyOnNwMyIgdXJsPSJodHRwOi8vd3d3LnNlY3VyaXR5LWRhdGFiYXNlLmNvbS9jcGUucGhwP2Rl dGFpbD1jcGU6L2E6bWljcm9zb2Z0Om9mZmljZV93b3JkOjIwMDI6c3AzIiBzb3VyY2U9Ik1JVFJF Ii8+CiAgICAgIDxDUEUgbmFtZT0iY3BlOi9hOm1pY3Jvc29mdDpvZmZpY2Vfd29yZF92aWV3ZXI6 MjAwMzpzcDMiIHVybD0iaHR0cDovL3d3dy5zZWN1cml0eS1kYXRhYmFzZS5jb20vY3BlLnBocD9k ZXRhaWw9Y3BlOi9hOm1pY3Jvc29mdDpvZmZpY2Vfd29yZF92aWV3ZXI6MjAwMzpzcDMiIHNvdXJj ZT0iTUlUUkUiLz4KICAgICAgPENQRSBuYW1lPSJjcGU6L2E6bWljcm9zb2Z0Om9mZmljZV93b3Jk X3ZpZXdlciIgdXJsPSJodHRwOi8vd3d3LnNlY3VyaXR5LWRhdGFiYXNlLmNvbS9jcGUucGhwP2Rl dGFpbD1jcGU6L2E6bWljcm9zb2Z0Om9mZmljZV93b3JkX3ZpZXdlciIgc291cmNlPSJNSVRSRSIv PgogICAgICA8Q1BFIG5hbWU9ImNwZTovYTptaWNyb3NvZnQ6b3Blbl94bWxfZmlsZV9mb3JtYXRf Y29udmVydGVyOjo6bWFjIiB1cmw9Imh0dHA6Ly93d3cuc2VjdXJpdHktZGF0YWJhc2UuY29tL2Nw ZS5waHA/ZGV0YWlsPWNwZTovYTptaWNyb3NvZnQ6b3Blbl94bWxfZmlsZV9mb3JtYXRfY29udmVy dGVyOjo6bWFjIiBzb3VyY2U9Ik1JVFJFIi8+CiAgICA8L0NQRXM+CiAgICA8T1ZBTHM+CiAgICAg IDxPVkFMIGlkPSJvdmFsOm9yZy5taXRyZS5vdmFsOmRlZjo2NTU1IiBzb3VyY2U9Ik1JVFJFIiBj bGFzcz0idnVsbmVyYWJpbGl0eSIgbmFtZT0iTWljcm9zb2Z0IE9mZmljZSBXb3JkIEZpbGUgSW5m b3JtYXRpb24gTWVtb3J5IENvcnJ1cHRpb24gVnVsbmVyYWJpbGl0eSIgdXJsPSJodHRwOi8vb3Zh bC5taXRyZS5vcmcvcmVwb3NpdG9yeS9kYXRhL2dldERlZj9pZD1vdmFsOm9yZy5taXRyZS5vdmFs OmRlZjo2NTU1Ii8+CiAgICAgIDxPVkFMIGlkPSJvdmFsOm9yZy5taXRyZS5vdmFsOmRlZjo5NzMi IHNvdXJjZT0iTUlUUkUiIGNsYXNzPSJpbnZlbnRvcnkiIG5hbWU9Ik1pY3Jvc29mdCBXb3JkIDIw MDIgaXMgaW5zdGFsbGVkIiB1cmw9Imh0dHA6Ly9vdmFsLm1pdHJlLm9yZy9yZXBvc2l0b3J5L2Rh dGEvZ2V0RGVmP2lkPW92YWw6b3JnLm1pdHJlLm92YWw6ZGVmOjk3MyIvPgogICAgICA8T1ZBTCBp ZD0ib3ZhbDpvcmcubWl0cmUub3ZhbDpkZWY6NDc1IiBzb3VyY2U9Ik1JVFJFIiBjbGFzcz0iaW52 ZW50b3J5IiBuYW1lPSJNaWNyb3NvZnQgV29yZCAyMDAzIGlzIGluc3RhbGxlZCIgdXJsPSJodHRw Oi8vb3ZhbC5taXRyZS5vcmcvcmVwb3NpdG9yeS9kYXRhL2dldERlZj9pZD1vdmFsOm9yZy5taXRy ZS5vdmFsOmRlZjo0NzUiLz4KICAgICAgPE9WQUwgaWQ9Im92YWw6b3JnLm1pdHJlLm92YWw6ZGVm OjczNyIgc291cmNlPSJNSVRSRSIgY2xhc3M9ImludmVudG9yeSIgbmFtZT0iTWljcm9zb2Z0IFdv cmQgVmlld2VyIGlzIGluc3RhbGxlZCIgdXJsPSJodHRwOi8vb3ZhbC5taXRyZS5vcmcvcmVwb3Np dG9yeS9kYXRhL2dldERlZj9pZD1vdmFsOm9yZy5taXRyZS5vdmFsOmRlZjo3MzciLz4KICAgIDwv T1ZBTHM+CiAgICA8T1NWREJzPgogICAgICA8T1NWREIgaWQ9IjU5ODU3IiBzb3VyY2U9Ik9TVkRC IiBuYW1lPSJNaWNyb3NvZnQgT2ZmaWNlIFdvcmQgRG9jdW1lbnQgTWFsZm9ybWVkIEZpbGUgSW5m b3JtYXRpb24gQmxvY2sgKEZJQikgUGFyc2luZyBNZW1vcnkgQ29ycnVwdGlvbiIgdXJsPSJodHRw Oi8vb3N2ZGIub3JnL3Nob3cvb3N2ZGIvNTk4NTciLz4KICAgIDwvT1NWREJzPgogIDwvQWxlcnQ+ CjwvdmRuYT4K </return> </ns1:get_vdnaCVELast10PublishedResponse> </SOAP-ENV:Body> </SOAP-ENV:Envelope>