Data Points

Every entry consists of different data points. The more data points are available, the better the detail level of the entry will be. The following table illustrates all supported data points. The API allows accessing them individually. VulDB provides the best data quality with more than 280 different vulnerability data points. This article is discussing the available data points provided by the current release of our service.

Simplicity is our primary goal when it comes to data accessibility. Some data points might consists of multiple data which will be provided as an array. If there is just one item, no such array will be used and the data delivered as single string instead. See the column Type to understand the appearance of the according data point.

Data PointTitleExampleTypeAvailability
entry_idUnique ID of vuldb entry80928numberpublic
entry_titleTitle of the vulnerabilityGoogle Android binder.c memory corruptionstringpublic
entry_summaryQuick summary of the vulnerability (2-5 sentences)A vulnerability has been found in Google Android and classified as very critical. Affected by this issue is some functionality of the file binder.c. Applying a patch is able to eliminate this problem.stringpublic
entry_details_affectedTextual representation of affected productsA vulnerability classified as critical was found in Google Android (Smartphone Operating System) (affected version unknown).stringpublic
entry_details_vulnerabilityTextual representation of vulnerability detailsThe manipulation with an unknown input leads to a memory corruption vulnerability (Use-After-Free). The CWE definition for the vulnerability is CWE-416.stringpublic
entry_details_impactTextual representation of attack impactAs an impact it is known to affect confidentiality, integrity, and availability.stringpublic
entry_details_countermeasureTextual representation of countermeasure suggestionsApplying a patch is able to eliminate this problem.stringpublic
entry_details_sourcesTextual representation of source dataEntries connected to this vulnerability are available at 145533, 145532, 145530 and 145529.stringpublic
entry_timestamp_queueunix timestamp of adding item to queue1044230400unix timestampinternal
entry_timestamp_createunix timestamp of creating the entry1044230400unix timestamppublic
entry_timestamp_changeunix timestamp of last change if the entry1454427609unix timestamppublic
entry_maintainer_queueName of person that added item to queueusr0133stringinternal
entry_maintainer_createName of person that created the entry initiallyusr0120stringinternal
entry_maintainer_changeName of person that updated the entry for the last timeusr201stringinternal
entry_replacesList of other entries which are declared duplicates and are replaced by this entry18273, 18277string arraypublic
entry_changelogChange log with name of updated fields of the latest entry updatesource_securityfocus_date source_securityfocus_class advisory_reportconfidencestring arraypublic
entry_smssIssue of smSS which discusses the item2019-01-19timestampinternal
entry_smss_rankRanking number for smSS issue discussion1numberinternal
software_typeType of affected softwareOperating Systemstringpublic
software_vendorName of vendor of affected productMicrosoftstring/arraypublic
software_nameName of affected product(s)Windowsstring/arraypublic
software_versionVersion number(s) of affected productVista/7/8/8.1string/arraypublic
software_platformName of affected platform(s)64-bitstring/arraypublic
software_componentName of affected component(s)SSL Handlerstring/arraypublic
software_fileName of affected file(s)ssl.exestringpublic
software_libraryName of affected library(s)ssl.dllstringpublic
software_functionName of affected function(s)decrypt()string/arraypublic
software_argumentName of affected argument(s)$rawdatastring/arraypublic
software_input_typeType of affected inputRegexstringpublic
software_input_valueExample of input value to attack">foostring/arraypublic
software_website_vendorURL of the web site of the vendor of affected producthttps://www.microsoft.com/stringpublic
software_website_productURL of the web site of the affected product itselfhttps://www.microsoft.com/en-us/windowsstringpublic
software_affectedlistList of affected products if very long and/or unordered (only if multiple and contradicting products are affected)Google Android, Linux Kernel, FreeBSDstring arraypublic
software_notaffectedlistList of not affected products if very long and/or unordered (only if multiple and contradicting products are affected)Microsoft Windows ME/XPstring arraypublic
software_cpeCPE 2.2-compatible list of affected products/versionscpe:/o:microsoft:windows_7:-:sp1, cpe:/o:microsoft:windows_8.1, cpe:/o:microsoft:windows_10string arraypublic
software_cpe23CPE 2.3-compatible list of affected products/versionscpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*, cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*, cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*string arraypublic
software_advisoryquoteQuote about the affected software from the original advisoryThe issue not well understood.stringpublic
software_freetextenAdditional text describing the software (English)Additional verification has shown that the issue is affecting default installs only.stringinternal
software_freetextdeAdditional text describing the software (German)Nachforschungen haben ergeben, dass die Schwachstelle nur bei Standardinstallationen auftritt.stringinternal
vulnerability_namepopular name of the vulnerabilityShellshockstring/arraypublic
vulnerability_introductiondateUnix timestamp of introducing the vulnerability1071705600unix timestamppublic
vulnerability_discoverydateUnix timestamp of discovering the vulnerability for the first time1071705600unix timestamppublic
vulnerability_vendorinformdateUnix timestamp of informing the vendor about the vulnerability for the first time1097539200unix timestamppublic
vulnerability_timelineTimeline of known events01/04/2016 | CVE assigned; 02/10/2016 | Advisory disclosed; 02/10/2016 | Exploit disclosed; 02/10/2016 | Countermeasure disclosed; 02/10/2016 | SecurityTracker entry created; 02/11/2016 | VulDB entry created; 02/15/2016 | VulDB entry updatedarray (unix timestamp, string, url)public
vulnerability_className of the vulnerability classBuffer Overflowstringpublic
vulnerability_cweCWE id of the vulnerability classCWE-121stringpublic
vulnerability_impactImpact of a succesful exploitationExecuting arbitrary codestringpublic
vulnerability_riskscip Risk rating (1=problematic, 2=critical, 3=very critical)3number (1-3)public
vulnerability_simplicitySimplicity of exploitation (0-100)60number (0-100)public
vulnerability_popularityPopularity of the vulnerability (0-100)80number (0-100)public
vulnerability_historicHistorical impact of the issue (1=yes, 0=no)1boolean (0, 1)public
vulnerability_cvss2_vuldb_basescoreCVSSv2 Base Score by VulDB6.6number (0.0-10.0)public
vulnerability_cvss2_vuldb_tempscoreCVSSv2 Temp Score by VulDB6.2number (0.0-10.0)public
vulnerability_cvss2_vuldb_avCVSSv2 Base Score Access Vector by VulDBNstringpublic
vulnerability_cvss2_vuldb_acCVSSv2 Base Score Access Complexity by VulDBMstringpublic
vulnerability_cvss2_vuldb_auCVSSv2 Base Score Authentication by VulDBSstringpublic
vulnerability_cvss2_vuldb_ciCVSSv2 Base Score Confidientality Impact by VulDBCstringpublic
vulnerability_cvss2_vuldb_iiCVSSv2 Base Score Integrity Impact by VulDBCstringpublic
vulnerability_cvss2_vuldb_aiCVSSv2 Base Score Availability Impact by VulDBCstringpublic
vulnerability_cvss2_vendor_basescoreCVSSv2 Base Score by Vendor6.6number (0.0-10.0)public
vulnerability_cvss2_vendor_tempscoreCVSSv2 Temp Score by Vendor6.2number (0.0-10.0)public
vulnerability_cvss2_vendor_avCVSSv2 Base Score Access Vector by VendorNstringpublic
vulnerability_cvss2_vendor_acCVSSv2 Base Score Access Complexity by VendorMstringpublic
vulnerability_cvss2_vendor_auCVSSv2 Base Score Authentication by VendorSstringpublic
vulnerability_cvss2_vendor_ciCVSSv2 Base Score Confidientality Impact by VendorCstringpublic
vulnerability_cvss2_vendor_iiCVSSv2 Base Score Integrity Impact by VendorCstringpublic
vulnerability_cvss2_vendor_aiCVSSv2 Base Score Availability Impact by VendorCstringpublic
vulnerability_cvss2_researcher_basescoreCVSSv2 Base Score by Researcher6.6number (0.0-10.0)public
vulnerability_cvss2_researcher_tempscoreCVSSv2 Temp Score by Researcher6.2number (0.0-10.0)public
vulnerability_cvss2_researcher_avCVSSv2 Base Score Access Vector by ResearcherNstringpublic
vulnerability_cvss2_researcher_acCVSSv2 Base Score Access Complexity by ResearcherMstringpublic
vulnerability_cvss2_researcher_auCVSSv2 Base Score Authentication by ResearcherSstringpublic
vulnerability_cvss2_researcher_ciCVSSv2 Base Score Confidientality Impact by ResearcherCstringpublic
vulnerability_cvss2_researcher_iiCVSSv2 Base Score Integrity Impact by ResearcherCstringpublic
vulnerability_cvss2_researcher_aiCVSSv2 Base Score Availability Impact by ResearcherCstringpublic
vulnerability_cvss2_nvd_basescoreCVSSv2 Base Score by NIST NVD6.6number (0.0-10.0)public
vulnerability_cvss2_nvd_tempscoreCVSSv2 Temp Score by NIST NVD6.2number (0.0-10.0)public
vulnerability_cvss2_nvd_avCVSSv2 Base Score Access Vector by NIST NVDNstringpublic
vulnerability_cvss2_nvd_acCVSSv2 Base Score Access Complexity by NIST NVDMstringpublic
vulnerability_cvss2_nvd_auCVSSv2 Base Score Authentication by NIST NVDSstringpublic
vulnerability_cvss2_nvd_ciCVSSv2 Base Score Confidientality Impact by NIST NVDCstringpublic
vulnerability_cvss2_nvd_iiCVSSv2 Base Score Integrity Impact by NIST NVDCstringpublic
vulnerability_cvss2_nvd_aiCVSSv2 Base Score Availability Impact by NIST NVDCstringpublic
vulnerability_cvss3_meta_basescoreCVSSv3 Base Meta Score calculation of all available risk sources7.8number (0.0-10.0)public
vulnerability_cvss3_meta_tempscoreCVSSv3 Temp Meta Score calculation of all available risk sources7.8number (0.0-10.0)public
vulnerability_cvss3_vuldb_basescoreCVSSv3 Base Score calculation by VulDB7.8number (0.0-10.0)public
vulnerability_cvss3_vuldb_tempscoreCVSSv3 Temp Score calculation by VulDB7.8number (0.0-10.0)public
vulnerability_cvss3_vuldb_basevectorCVSSv3 Base Vector generation by VulDBAV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:Lstringpublic
vulnerability_cvss3_vuldb_tempvectorCVSSv3 Temp Vector generation by VulDBE:X/RL:O/RC:Cstringpublic
vulnerability_cvss3_vuldb_avCVSSv3 Base Score Access Vector by VulDBNstringpublic
vulnerability_cvss3_vuldb_acCVSSv3 Base Score Attack Complexity by VulDBLstringpublic
vulnerability_cvss3_vuldb_prCVSSv3 Base Score Privileges Required by VulDBLstringpublic
vulnerability_cvss3_vuldb_uiCVSSv3 Base Score User Interactivity Required by VulDBNstringpublic
vulnerability_cvss3_vuldb_sCVSSv3 Base Score Scope Change by VulDBCstringpublic
vulnerability_cvss3_vuldb_cCVSSv3 Base Score Confidientality Impact by VulDBHstringpublic
vulnerability_cvss3_vuldb_iCVSSv3 Base Score Integrity Impact by VulDBHstringpublic
vulnerability_cvss3_vuldb_aCVSSv3 Base Score Availability Impact by VulDBHstringpublic
vulnerability_cvss3_vendor_basescoreCVSSv3 Base Score calculation by Vendor7.8number (0.0-10.0)public
vulnerability_cvss3_vendor_tempscoreCVSSv3 Temp Score calculation by Vendor7.6number (0.0-10.0)public
vulnerability_cvss3_vendor_avCVSSv3 Base Score Access Vector by VendorNstringpublic
vulnerability_cvss3_vendor_acCVSSv3 Base Score Attack Complexity by VendorLstringpublic
vulnerability_cvss3_vendor_prCVSSv3 Base Score Privileges Required by VendorLstringpublic
vulnerability_cvss3_vendor_uiCVSSv3 Base Score User Interactivity Required by VendorNstringpublic
vulnerability_cvss3_vendor_sCVSSv3 Base Score Scope Change by VendorCstringpublic
vulnerability_cvss3_vendor_cCVSSv3 Base Score Confidientality Impact by VendorHstringpublic
vulnerability_cvss3_vendor_iCVSSv3 Base Score Integrity Impact by VendorHstringpublic
vulnerability_cvss3_vendor_aCVSSv3 Base Score Availability Impact by VendorHstringpublic
vulnerability_cvss3_researcher_basescoreCVSSv3 Base Score calculation by Rersearcher7.8number (0.0-10.0)public
vulnerability_cvss3_researcher_tempscoreCVSSv3 Temp Score calculation by Rersearcher7.6number (0.0-10.0)public
vulnerability_cvss3_researcher_avCVSSv3 Base Score Access Vector by ResearcherNstringpublic
vulnerability_cvss3_researcher_acCVSSv3 Base Score Attack Complexity by ResearcherLstringpublic
vulnerability_cvss3_researcher_prCVSSv3 Base Score Privileges Required by ResearcherLstringpublic
vulnerability_cvss3_researcher_uiCVSSv3 Base Score User Interactivity Required by ResearcherNstringpublic
vulnerability_cvss3_researcher_sCVSSv3 Base Score Scope Change by ResearcherCstringpublic
vulnerability_cvss3_researcher_cCVSSv2 Base Score Confidientality Impact by ResearcherHstringpublic
vulnerability_cvss3_researcher_iCVSSv2 Base Score Integrity Impact by ResearcherHstringpublic
vulnerability_cvss3_researcher_aCVSSv2 Base Score Availability Impact by ResearcherHstringpublic
vulnerability_cvss3_nvd_basescoreCVSSv3 Base Score calculation by NIST NVD7.8number (0.0-10.0)public
vulnerability_cvss3_nvd_tempscoreCVSSv3 Temp Score calculation by NIST NVD7.6number (0.0-10.0)public
vulnerability_cvss3_nvd_avCVSSv3 Base Score Access Vector by NIST NVDNstringpublic
vulnerability_cvss3_nvd_acCVSSv3 Base Score Attack Complexity by NIST NVDLstringpublic
vulnerability_cvss3_nvd_prCVSSv3 Base Score Privileges Required by NIST NVDLstringpublic
vulnerability_cvss3_nvd_uiCVSSv3 Base Score User Interactivity Required by NIST NVDNstringpublic
vulnerability_cvss3_nvd_sCVSSv3 Base Score Scope Change by NIST NVDCstringpublic
vulnerability_cvss3_nvd_cCVSSv3 Base Score Confidientality Impact by NIST NVDHstringpublic
vulnerability_cvss3_nvd_iCVSSv3 Base Score Integrity Impact by NIST NVDHstringpublic
vulnerability_cvss3_nvd_aCVSSv3 Base Score Availability Impact by NIST NVDHstringpublic
vulnerability_titlewordAdditional word for the vulnerability titleCryptohammerstringpublic
vulnerability_keywordsAdditional keywords for searchW32.Cyptohammer.Worm, BlackSSLstringinternal
vulnerability_sourcecodeSource code snippet of affected partsstring (multiline possible)public
vulnerability_advisoryquoteQuote about the vulnerability from the original advisoryThe issue got verified by the core developers right after the initial notification.stringpublic
vulnerability_freetextenAdditional text describing the vulnerability (English)stringinternal
vulnerability_freetextdeAdditional text describing the vulnerability (German)stringinternal
advisory_dateunix timestamp of the disclosure date1097625600unix timestamppublic
advisory_locationName of the location of the initial disclosureWebsitestringpublic
advisory_typeType of the initial disclosureAdvisorystringpublic
advisory_urlURL of the initial disclosurehttp://www.example.com/advisory.php?id=42string urlpublic
advisory_viaDisclosure via a vulnerability broker ZDIstringpublic
advisory_identifierUnique identifier of the advisoryMS-ADV:2016-42string/arraypublic
advisory_reportconfidenceCVSSv2 and CVSSv3 Base Score ConfidenceCstringpublic
advisory_coordinationCoordinated disclosure (1=yes, 0=no)1boolean (0, 1)public
advisory_person_nameName of the person that found the issueJohn Doestring/arraypublic
advisory_person_nicknameNickname of the person that found the issueDr. Sashimistring/arraypublic
advisory_person_mailEmail of the person that found the issuesashimi@example.comstring mail addresspublic
advisory_person_websiteWebsite of the person that found the issuehttps://sashimi.example.comstring urlpublic
advisory_company_nameName of the company of the person that found the issueSashimi Ltd.string/arraypublic
advisory_reaction_dateunix timestamp of the reaction of the vendor towards of the finding1097625600unix timestamppublic
advisory_confirm_urlURL of the vendor confirmation of the vulnerabilityhttp://www.microsoft.com/...string urlpublic
advisory_confirm_dateDate of the vendor confirmation of the vulnerability1097625600unix timestamppublic
advisory_disputedThe issue is disputed (1=yes, 0=no)1boolean (0, 1)public
advisory_falsepositiveThe issue is a false-positive (1=yes, 0=no)0boolean (0, 1)public
advisory_advisoryquoteQuote about the disclosure from the original advisorystringpublic
advisory_freetextenAdditional text describing the disclosure (English)stringpublic
advisory_freetextdeAdditional text describing the disclosure (German)stringpublic
exploit_availabilityAvailability of the exploit (1=yes, 0=no)1boolean (0, 1)public
exploit_dateunix timestamp of the first release of a public exploit1097625600unix timestamppublic
exploit_publicityPublicity of the exploitstringpublicpublic
exploit_urlURL of the exploithttps://sashimi.example.com/exploit.php?id=23string urlpublic
exploit_developer_nameName of the person that created the exploitJohn Doestring/arraypublic
exploit_developer_nicknameNickname of the person that created the exploitDr. Sashimistring/arraypublic
exploit_developer_mailEmail of the person that created the exploitsashimi@example.comstring mail addresspublic
exploit_developer_websiteWebsite of the person that created the exploithttps://sashimi.example.comstring urlpublic
exploit_languageProgramming language of the exploitPythonstringpublic
exploit_exploitabilityExploitability level of the exploitPOCstringpublic
exploit_reliabilityReliability of the exploit (0-100)99number (0-100)public
exploit_wormifiedExploit got used within an automated worm (1=yes, 0=no)1boolean (0, 1)public
exploit_googlehackstring for Google dorkinurl:ssl.aspxstringpublic
exploit_advisoryquoteQuote about the exploit from the original advisorystringpublic
exploit_sourcecodeSource code snippet of the exploitstring (multiline possible)public
exploit_freetextenAdditional text describing the exploit (English)stringpublic
exploit_freetextdeAdditional text describing the exploit (German)stringpublic
exploit_price_0dayKnown or estimated 0-day price of the exploit$50k-$100kstringpublic
exploit_price_todayKnown or estimated price of the exploit as of today (updated daily)$10k-$25kstringpublic
exploit_price_trendWill exploit prices rise or drop in the future+stringpublic
exploit_price_timelineNot available yetstring arrayinternal
countermeasure_remediationlevelCVSSv2 Base Score Remediation LevelOFstringpublic
countermeasure_nameName of the suggested countermeasureUpgradestringpublic
countermeasure_dateunix timestamp of the release of the first countermeasure1097625600unix timestamppublic
countermeasure_reliabilityReliability of the countermeasure (0-100)99number (0-100)public
countermeasure_upgrade_versionFirst known unaffected version(s)10/Server 2003string/arraypublic
countermeasure_upgrade_urlURL of the upgraded versionhttps://windowsupdate.microsoft.comstring urlpublic
countermeasure_patch_nameName of the patchMS16-099string/arraypublic
countermeasure_patch_urlURL of the patchhttps://technet.microsoft.com/library/security/MS16-099stringpublic
countermeasure_config_settingConfig setting to eliminate the vulnerabilityAllowSHA1=FALSEstringpublic
countermeasure_firewalling_portFirewall port(s) to eliminate the vulnerabilitytcp/80 (http) & tcp/443 (https)stringpublic
countermeasure_authentication_nameAdditional authentication(s) to eliminate the vulnerability.htaccessstring/arraypublic
countermeasure_encryption_nameAdditional encryption(s) to eliminate the vulnerabilityIPsecstring/arraypublic
countermeasure_workaround_nameName of the workaround(s) to eliminate the vulnerabilityChange the Templatestring/arraypublic
countermeasure_workaround_urlURL of the workaround(s) to eliminate the vulnerabilityhttps://example.comstringpublic
countermeasure_alternative_nameAlternative products that provide similar features without this vulnerabilityMozilla Firefox, Google Chromestring/arraypublic
countermeasure_sourcecodeSource code snippet of the countermeasurestring (multiline possible)public
countermeasure_advisoryquoteQuote about the countermeasure from the original advisorystringpublic
countermeasure_freetextenAdditional text describing the countermeasure (English)stringpublic
countermeasure_freetextdeAdditional text describing the countermeasure (German)stringpublic
source_cveCVE IDCVE-2016-1234stringpublic
source_cve_assignedunix timestamp of the CVE assignment1108857600unix timestamppublic
source_cve_nvd_publishedunix timestamp of the CVE published on NVD1097539200unix timestamppublic
source_cve_nvd_summaryCVE summary provided on NVDSome web servers under Microsoft Windows allow remote attackers to bypass access restrictions for files with long file names.stringpublic
source_oval_idOVAL IDoval:org.mitre.oval:def:14735stringpublic
source_iavmIAVM2011-A-0167stringpublic
source_iavm_vmskeyIAVM VMSKEYV0030830stringpublic
source_iavm_titleIAVM titleMicrosoft Cumulative Security Update of ActiveX Kill Bitsstringpublic
source_osvdbOSVDB ID12914numberpublic
source_osvdb_createunix timestamp of the OSVDB entry creation1104710400unix timestamppublic
source_osvdb_titleOSVDB titleWindows Kernel Multiprocessor Page Fault Handler Race Conditionstringpublic
source_secuniaSecunia ID13822numberpublic
source_secunia_dateunix timestamp of the Secunia entry creation1104710400unix timestamppublic
source_secunia_titleSecunia titleWindows Kernel Page Fault Handler Privilege Escalationstringpublic
source_secunia_riskSecunia risk levelLess Criticalstringpublic
source_securityfocusSecurityFocus ID12244numberpublic
source_securityfocus_dateunix timestamp of the SecurityFocus entry creation1104710400unix timestamppublic
source_securityfocus_classSecurityFocus vulnerability classInput Validation Errorstringpublic
source_securityfocus_titleSecurityFocus titleWindows Remote Format String Vulnerabilitystringpublic
source_sectrackerSecurityTracker ID1012862numberpublic
source_sectracker_dateunix timestamp of the SecurityTracker entry creation1105488000unix timestamppublic
source_sectracker_titleSecurityTracker titleWindows Kernel Multiprocessor Page Fault Handler Race Condition Lets Local Users Gain Elevated Privilegesstringpublic
source_sectracker_causeSecurityTracker causeAccess control errorstringpublic
source_vulnerabilitycenterVulnerability Center ID51222numberpublic
source_vulnerabilitycenter_titleVulnerability Center titleWindows Kernel Multiprocessor Page Fault Handler Race Condition Lets Local Users Gain Elevated Privilegesstringpublic
source_vulnerabilitycenter_severityVulnerability Center severityMediumstringpublic
source_vulnerabilitycenter_creationdateunix timestamp of the Vulnerability Center entry creation1105488000unix timestamppublic
source_vulnerabilitycenter_lastupdatedateunix timestamp of the Vulnerability Center entry last update1105488000unix timestamppublic
source_vulnerabilitycenter_reportingdateunix timestamp of the Vulnerability Center reporting date1105488000unix timestamppublic
source_vupenVupen IDADV-2009-1233 stringpublic
source_xforceIBM X-Force ID11695numberpublic
source_xforce_dateunix timestamp of the IBM X-Force entry creation1105488000unix timestamppublic
source_xforce_titleIBM X-Force titleWindows LF (Line Feed) denial of servicestringpublic
source_xforce_identifierIBM X-Force identifiermicrosoft-http-lf-dosstringpublic
source_xforce_riskIBM X-Force risk (obsolete since 2015)Medium Riskstringpublic
source_cert_vuCERT VU252068numberpublic
source_securiteamSecuriTeam.com URLhttp://www.securiteam.com/windowsntfocus/5MP0F1F95U.htmlstring urlpublic
source_exploitdbExploit-DB ID37932numberpublic
source_exploitdb_dateunix timestamp of the Exploit-DB entry creation1105488000unix timestamppublic
source_heiseHeise.de URL ID44502numberpublic
source_tecchannelTecchannel URL ID (obsolete)2093stringpublic
source_nessus_idNessus ID88647numberpublic
source_nessus_nameNessus plugin titleMS16-015: Security Update for Microsoft Office to Address Remote Code Execution (3134226)stringpublic
source_nessus_filenameNessus plugin filenamemicrosoft_windows_ssl.naslstringpublic
source_nessus_riskNessus riskCriticalstringpublic
source_nessus_familyNessus familyWindows : Microsoft Bulletinsstringpublic
source_nessus_typeNessus plugin typeremotestringpublic
source_nessus_portNessus plugin port445stringpublic
source_nessus_dateNessus plugin date1105488000unix timestamppublic
source_pvs_idPVS ID8276numberpublic
source_pvs_titlePVS titleWindows Multiple Vulnerabilitiesstringpublic
source_pvs_riskPVS riskHighstringpublic
source_pvs_familyPVS familyWindowsstringpublic
source_openvas_idOpenVAS ID881920numberpublic
source_openvas_filenameOpenVAS filenamegb_CESA-2014_0383_samba4_centos6.naslstringpublic
source_openvas_titleOpenVAS titleWindows Update for samba4 CESA-2014:0383stringpublic
source_openvas_familyOpenVAS familyWindows Local Security Checksstringpublic
source_qualys_idQualys ID38370numberpublic
source_qualys_titleQualys titleWindows Privilege Escalation Vulnerabilitystringpublic
source_saint_idSAINT IDexploit_info/iis5_webdavstringpublic
source_saint_titleSAINT titlentdll.dll buffer overflow via IIS 5.0 WebDAVstringpublic
source_saint_linkSAINT linkhttp://www.saintcorporation.com/cgi-bin/exploit_info/iis5_webdavstringpublic
source_msf_idMetasploit IDms03_007_ntdll_webdav.rbstringpublic
source_msf_filenameMetasploit filenamemetasploit-framework/modules/exploits/windows/iis/ms03_007_ntdll_webdav.rbstringpublic
source_msf_titleMetasploit titleMS03-007 Microsoft IIS 5.0 WebDAV ntdll.dll Path Overflowstringpublic
source_d2sec_urlD2 Elliot URLhttp://www.d2sec.com/exploits/vbulletin_4.1.x_rce.htmlstring urlpublic
source_d2sec_titleD2 Elliot titlevBulletin 4.1.x RCEstringpublic
source_d2sec_descD2 Elliot descriptionRemote command execution vulnerability in vBulletin upgrade.phpstringpublic
source_d2sec_familyD2 Elliot familyRemote Command Executionstringpublic
source_atkATK ID99numberpublic
source_snort_idSnort ID2090numberpublic
source_snort_classSnort classattempted-adminstringpublic
source_snort_messageSnort messageSERVER-IIS WEBDAV exploit attemptstringpublic
source_snort_patternSnort pattern}SNORT-stringpublic
source_suricata_idSuricata ID2002844numberpublic
source_suricata_sigSuricata signatureET WEB_SERVER WebDAV search overflowstringpublic
source_suricata_classSuricata classweb-applicationstringpublic
source_sourcefire_ips_idSourcefire IPS ID8427numberpublic
source_issproventiaISS Proventia ID2118084numberpublic
source_tippingpoint_idTippingpoint ID4725numberpublic
source_tippingpoint_titleTippingpoint titleHTTP: AOL ICQ ActiveX Control Code Execution (ZDI-06-037)stringpublic
source_tippingpoint_categoryTippingpoint categoryVulnerabilitiesstringpublic
source_mcafee_ips_idMcAfee IPS IDDNS: ISC BIND Resolver Library Buffer Overflow Vulnerabilitystringpublic
source_mcafee_ips_versionMcAfee IPS version8.1.38.3stringpublic
source_paloalto_ips_idPalo-Alto IPS ID30354numberpublic
source_fortigate_ips_idFortigate IPS ID12718numberpublic
source_screenshotScreenshot of the vulnerability and/or attackexample_screenshot.jpgstring filenamepublic
source_videolinkLink to video describing or showing the attack (Youtube, Vimeo, etc.)https://youtu.be/GsCpyUJDyjQstring urlpublic
source_miscMisc. Linkhttps://blog.exodusintel.com/2016/02/10/firewall-hacking/string urlpublic
source_seealsoIDs of similar VulDB entries (if available)12354, 84635, 78413string arraypublic
legacy_titleLegacy title (old entries)(obsolete)stringinternal
legacy_affectedLegacy affected products (old entries)(obsolete)stringinternal
legacy_descriptionLegacy description (old entries)(obsolete)stringinternal
legacy_expertLegacy comment (old entries)(obsolete)stringinternal

The output format of the API (e.g. JSON, XML) can be defined by request. The naming of the data fields in this article is the internal naming of the fields and not the naming structure of the various output formats. They transpond very easily.

Do you know our Splunk app?

Download it now for free!