[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Data Points

📌 Article pinned by VulDB Support Team

Every entry consists of different data points. The more data points are available, the better the detail level of the entry will be. The following tables illustrates all supported data points within our data feeds. The API allows accessing them individually. VulDB provides the best data quality with more than 530 different vulnerability data points. This article is discussing the available data points provided by the current release of our service.

Strings and Arrays

Simplicity is our primary goal when it comes to data accessibility. Some data points might consists of multiple data which will be provided as an array. If there is just one item, no such array will be used and the data delivered as single string instead. See the column Type to understand the appearance of the according data point.

Monoblock, Virtual Fields, and Meta Data

Most data is stored in the so called Monoblock. This data repository contains all commits associated with an entry. Some data is based on the Meta information of these commits. And others called Virtual Fields are not stored but generated on demand. They are either read-only or depend on fields which might be writable.

API Output Format

The output format of the API (e.g. JSON, XML, CSV) can be defined by request. The naming of the data fields in this article is the internal naming of the fields and not the naming structure of the various output formats. They transpond very easily.

Available API endpoints:

Vulnerability APIVulnerabilitiesdatapointsfree sample
CTI APIIP Addresses, Hostnames, Actorsdatapointsfree sample
CTI APIEventsdatapointsfree sample

Vulnerabilities

The best possible vulnerability data source for professional vulnerability and patch management.

📥 Download Free API Response Sample

FieldTitleExampleTypeRepoAccess
entry_idUnique ID of vuldb entry80928nummetapub
entry_titleTitle of the vulnerabilityGoogle Android binder.c memory corruptionstrvirtpub
entry_summaryQuick summary of the vulnerability (2-5 sentences)A vulnerability has been found in Google Android and classified as very critical. Affected by this issue is some functionality of the file binder.c. Applying a patch is able to eliminate this problem.strvirtpub
entry_details_affectedTextual representation of affected productsA vulnerability classified as critical was found in Google Android (Smartphone Operating System) (affected version unknown).strvirtpub
entry_details_vulnerabilityTextual representation of vulnerability detailsThe manipulation with an unknown input leads to a memory corruption vulnerability (Use-After-Free). The CWE definition for the vulnerability is CWE-416.strvirtpub
entry_details_impactTextual representation of attack impactAs an impact it is known to affect confidentiality, integrity, and availability.strvirtpub
entry_details_countermeasureTextual representation of countermeasure suggestionsApplying a patch is able to eliminate this problem.strvirtpub
entry_details_sourcesTextual representation of source dataEntries connected to this vulnerability are available at 145533, 145532, 145530 and 145529.strvirtpub
entry_timestamp_queueUnix timestamp of adding item to queue1044230400tstampmetaint
entry_timestamp_createUnix timestamp of creating the entry1044230400tstampmetapub
entry_timestamp_changeUnix timestamp of last change if the entry1454427609tstampmetapub
entry_maintainer_queueName of person that added item to queueusr0133strmetaint
entry_maintainer_createName of person that created the entry initiallyusr0120strmetaint
entry_maintainer_changeName of person that updated the entry for the last timeusr201strmetaint
entry_replacesList of other entries which are declared duplicates and are replaced by this entry18273, 18277str arrmonopub
entry_replacedbyID of duplicate entry that got replaced by this entry18278nummonopub
entry_changelogChange log with name of updated fields of the latest entry updatesource_securityfocus_date source_securityfocus_class advisory_reportconfidencestr arrvirtpub
entry_locked_statusStatus if an entry is locked (e.g. due to changes not moderated yet)1nummetapub
entry_locked_reasonReason for an entry to be lockedupdate in progressstrmetapub
entry_warningWarning message if entry could not be fully shownDetails not available, archive access not unlockedstrvirtpub
entry_smssIssue of smSS which discusses the item2019-01-19timestampmonoint
entry_smss_rankRanking number for smSS issue discussion1nummonoint
software_typeType of affected softwareOperating Systemstrmonopub
software_vendorName of vendor of affected productMicrosoftstr/arrmonopub
software_nameName of affected product(s)Windowsstr/arrmonopub
software_versionVersion number(s) of affected productVista/7/8/8.1str/arrmonopub
software_rollingreleaseIf a product does not use version numbering but rolling release instead (1=yes, 0=no)1bool (0, 1)monopub
software_platformName of affected platform(s)64-bitstr/arrmonopub
software_componentName of affected component(s)SSL Handlerstr/arrmonopub
software_fileName of affected file(s)ssl.exestrmonopub
software_libraryName of affected library(s)ssl.dllstrmonopub
software_functionName of affected function(s)decrypt()str/arrmonopub
software_argumentName of affected argument(s)$rawdatastr/arrmonopub
software_input_typeType of affected inputRegexstrmonopub
software_input_valueExample of input value to attack">foostr/arrmonopub
software_website_vendorURL of the web site of the vendor of affected producthttps://www.microsoft.com/strvirtpub
software_website_productURL of the web site of the affected product itselfhttps://www.microsoft.com/en-us/windowsstrvirtpub
software_license_typeType of the license of the affected productopen-sourcestr (open-source, free, commercial)virtpub
software_license_nameName of the license of the affected productGNU GPLv3strvirtpub
software_support_availabilityDeclaration if the software and/or version still gets vendor supportend of lifestrvirtpub
software_managedserviceIf a product is maintained and controlled as a managed service by a vendor (1=yes, 0=no)1bool (0, 1)monopub
software_affectedlistList of affected products if very long and/or unordered (only if multiple and contradicting products are affected)Google Android, Linux Kernel, FreeBSDstr arrmonopub
software_notaffectedlistList of not affected products if very long and/or unordered (only if multiple and contradicting products are affected)Microsoft Windows ME/XPstr arrmonopub
software_cpeCPE 2.2-compatible list of affected products/versions, based on our own extended dictionarycpe:/o:microsoft:windows_7:-:sp1, cpe:/o:microsoft:windows_8.1, cpe:/o:microsoft:windows_10str arrvirtpub
software_cpe23CPE 2.3-compatible list of affected products/versions, based on our own extended dictionarycpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*, cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*, cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*str arrvirtpub
software_advisoryquoteQuote about the affected software from the original advisoryThe issue not well understood.strmonopub
software_freetextenAdditional text describing the software (English)Additional verification has shown that the issue is affecting default installs only.strmonoint
software_freetextdeAdditional text describing the software (German)Nachforschungen haben ergeben, dass die Schwachstelle nur bei Standardinstallationen auftritt.strmonoint
vulnerability_namepopular name of the vulnerabilityShellshockstr/arrmonopub
vulnerability_titlewordAdditional word for the vulnerability titleCryptohammerstrmonopub
vulnerability_keywordsAdditional keywords for searchW32.Cyptohammer.Worm, BlackSSLstrmonoint
vulnerability_introductiondateUnix timestamp of introducing the vulnerability1071705600tstampmonopub
vulnerability_discoverydateUnix timestamp of discovering the vulnerability for the first time1071705600tstampmonopub
vulnerability_vendorinformdateUnix timestamp of informing the vendor about the vulnerability for the first time1097539200tstampmonopub
vulnerability_timelineTimeline of known events01/04/2016 | CVE assigned; 02/10/2016 | Advisory disclosed; 02/10/2016 | Exploit disclosed; 02/10/2016 | Countermeasure disclosed; 02/10/2016 | SecurityTracker entry created; 02/11/2016 | VulDB entry created; 02/15/2016 | VulDB entry updatedarr (unix timestamp, string, url)virtpub
vulnerability_className of the vulnerability classBuffer Overflowstrvirtpub
vulnerability_cweCWE id of the vulnerability classCWE-121strmonopub
vulnerability_capecCAPEC identifiers of the vulnerability class10, 209, 250str/arrvirtpub
vulnerability_attckFull identifier of MITRE ATT&CK techniqueT1059.007strvirtpub
vulnerability_impactImpact of a succesful exploitationExecuting arbitrary codestrmonopub
vulnerability_riskscip Risk rating (1=problematic, 2=critical, 3=very critical)3num (1-3)monopub
vulnerability_simplicitySimplicity of exploitation (0-100)60num (0-100)monopub
vulnerability_popularityPopularity of the vulnerability (0-100)80num (0-100)monopub
vulnerability_historicHistorical impact of the issue (1=yes, 0=no)1bool (0, 1)monopub
vulnerability_cvss4_vuldb_confidenceCVSSv4 Base Score confidence by VulDBHighstrvirtpub
vulnerability_cvss4_vuldb_bscoreCVSSv4 Base Score calculation by VulDB7.8num (0.0-10.0)monopub
vulnerability_cvss4_vuldb_btscoreCVSSv4 Threat Score calculation by VulDB7.8num (0.0-10.0)monopub
vulnerability_cvss4_vuldb_bvectorCVSSv4 Base Vector generation by VulDBAV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:Nstrvirtpub
vulnerability_cvss4_vuldb_btvectorCVSSv4 Threat Vector generation by VulDBAV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:Pstrvirtpub
vulnerability_cvss4_vuldb_bseverityCVSSv4 Base Score Severity representation by responsible VulDBHighstrvirtpub
vulnerability_cvss4_vuldb_btseverityCVSSv4 Threat Score Severity representation by responsible VulDBHighstrvirtpub
vulnerability_cvss4_vuldb_avCVSSv4 Base Metrics Access Vector by VulDBNstrmonopub
vulnerability_cvss4_vuldb_acCVSSv4 Base Metrics Attack Complexity by VulDBLstrmonopub
vulnerability_cvss4_vuldb_atCVSSv4 Base Metrics Attack Requirements by VulDBNstrmonopub
vulnerability_cvss4_vuldb_prCVSSv4 Base Metrics Privileges Required by VulDBNstrmonopub
vulnerability_cvss4_vuldb_uiCVSSv4 Base Metrics User Interaction by VulDBNstrmonopub
vulnerability_cvss4_vuldb_vcCVSSv4 Base Metrics Confidentiality Impact by VulDBLstrmonopub
vulnerability_cvss4_vuldb_viCVSSv4 Base Metrics Integrity Impact by VulDBLstrmonopub
vulnerability_cvss4_vuldb_vaCVSSv4 Base Metrics Availability Impact by VulDBLstrmonopub
vulnerability_cvss4_vuldb_scCVSSv4 Base Metrics Subsequent Confidentiality Impact by VulDBNstrmonopub
vulnerability_cvss4_vuldb_siCVSSv4 Base Metrics Subsequent Integrity Impact by VulDBNstrmonopub
vulnerability_cvss4_vuldb_saCVSSv4 Base Metrics Subsequent Availability Impact by VulDBNstrmonopub
vulnerability_cvss4_vuldb_sCVSSv4 Supplemental Metrics Safety by VulDBNstrmonopub
vulnerability_cvss4_vuldb_auCVSSv4 Supplemental Metrics Automatable by VulDBYstrmonopub
vulnerability_cvss4_vuldb_rCVSSv4 Supplemental Metrics Recovery by VulDBUstrmonopub
vulnerability_cvss4_vuldb_vCVSSv4 Supplemental Metrics Value Density by VulDBDstrmonopub
vulnerability_cvss4_vuldb_reCVSSv4 Supplemental Metrics Response Effort by VulDBLstrmonopub
vulnerability_cvss4_vuldb_uCVSSv4 Supplemental Metrics Provider Urgency by VulDBGreenstrmonopub
vulnerability_cvss4_vuldb_eCVSSv4 Threats Metrics Exploit Maturity by VulDBPstrmonopub
vulnerability_cvss4_nvd_bscoreCVSSv4 Base Score calculation by NIST NVD7.8num (0.0-10.0)monopub
vulnerability_cvss4_nvd_btscoreCVSSv4 Threat Score calculation by NIST NVD7.8num (0.0-10.0)monopub
vulnerability_cvss4_nvd_bvectorCVSSv4 Base Vector generation by NIST NVDAV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:Nstrvirtpub
vulnerability_cvss4_nvd_btvectorCVSSv4 Threat Vector generation by NIST NVDAV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:Pstrvirtpub
vulnerability_cvss4_nvd_bseverityCVSSv4 Base Score Severity representation by responsible NIST NVDHighstrvirtpub
vulnerability_cvss4_nvd_btseverityCVSSv4 Threat Score Severity representation by responsible NIST NVDHighstrvirtpub
vulnerability_cvss4_nvd_avCVSSv4 Base Metrics Access Vector by NIST NVDNstrmonopub
vulnerability_cvss4_nvd_acCVSSv4 Base Metrics Attack Complexity by NIST NVDLstrmonopub
vulnerability_cvss4_nvd_atCVSSv4 Base Metrics Attack Requirements by NIST NVDNstrmonopub
vulnerability_cvss4_nvd_prCVSSv4 Base Metrics Privileges Required by NIST NVDNstrmonopub
vulnerability_cvss4_nvd_uiCVSSv4 Base Metrics User Interaction by NIST NVDNstrmonopub
vulnerability_cvss4_nvd_vcCVSSv4 Base Metrics Confidentiality Impact by NIST NVDLstrmonopub
vulnerability_cvss4_nvd_viCVSSv4 Base Metrics Integrity Impact by NIST NVDLstrmonopub
vulnerability_cvss4_nvd_vaCVSSv4 Base Metrics Availability Impact by NIST NVDLstrmonopub
vulnerability_cvss4_nvd_scCVSSv4 Base Metrics Subsequent Confidentiality Impact by NIST NVDNstrmonopub
vulnerability_cvss4_nvd_siCVSSv4 Base Metrics Subsequent Integrity Impact by NIST NVDNstrmonopub
vulnerability_cvss4_nvd_saCVSSv4 Base Metrics Subsequent Availability Impact by NIST NVDNstrmonopub
vulnerability_cvss4_nvd_sCVSSv4 Supplemental Metrics Safety by NIST NVDNstrmonopub
vulnerability_cvss4_nvd_auCVSSv4 Supplemental Metrics Automatable by NIST NVDYstrmonopub
vulnerability_cvss4_nvd_rCVSSv4 Supplemental Metrics Recovery by NIST NVDUstrmonopub
vulnerability_cvss4_nvd_vCVSSv4 Supplemental Metrics Value Density by NIST NVDDstrmonopub
vulnerability_cvss4_nvd_reCVSSv4 Supplemental Metrics Response Effort by NIST NVDLstrmonopub
vulnerability_cvss4_nvd_uCVSSv4 Supplemental Metrics Provider Urgency by NIST NVDGreenstrmonopub
vulnerability_cvss4_nvd_eCVSSv4 Threats Metrics Exploit Maturity by NIST NVDPstrmonopub
vulnerability_cvss4_cna_bscoreCVSSv4 Base Score calculation by CVE Numbering Authority7.8num (0.0-10.0)monopub
vulnerability_cvss4_cna_btscoreCVSSv4 Threat Score calculation by CVE Numbering Authority7.8num (0.0-10.0)monopub
vulnerability_cvss4_cna_bvectorCVSSv4 Base Vector generation by CVE Numbering AuthorityAV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:Nstrvirtpub
vulnerability_cvss4_cna_btvectorCVSSv4 Threat Vector generation by CVE Numbering AuthorityAV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:Pstrvirtpub
vulnerability_cvss4_cna_bseverityCVSSv4 Base Score Severity representation by responsible CVE Numbering AuthorityHighstrvirtpub
vulnerability_cvss4_cna_btseverityCVSSv4 Threat Score Severity representation by responsible CVE Numbering AuthorityHighstrvirtpub
vulnerability_cvss4_cna_avCVSSv4 Base Metrics Access Vector by CVE Numbering AuthorityNstrmonopub
vulnerability_cvss4_cna_acCVSSv4 Base Metrics Attack Complexity by CVE Numbering AuthorityLstrmonopub
vulnerability_cvss4_cna_atCVSSv4 Base Metrics Attack Requirements by CVE Numbering AuthorityNstrmonopub
vulnerability_cvss4_cna_prCVSSv4 Base Metrics Privileges Required by CVE Numbering AuthorityNstrmonopub
vulnerability_cvss4_cna_uiCVSSv4 Base Metrics User Interaction by CVE Numbering AuthorityNstrmonopub
vulnerability_cvss4_cna_vcCVSSv4 Base Metrics Confidentiality Impact by CVE Numbering AuthorityLstrmonopub
vulnerability_cvss4_cna_viCVSSv4 Base Metrics Integrity Impact by CVE Numbering AuthorityLstrmonopub
vulnerability_cvss4_cna_vaCVSSv4 Base Metrics Availability Impact by CVE Numbering AuthorityLstrmonopub
vulnerability_cvss4_cna_scCVSSv4 Base Metrics Subsequent Confidentiality Impact by CVE Numbering AuthorityNstrmonopub
vulnerability_cvss4_cna_siCVSSv4 Base Metrics Subsequent Integrity Impact by CVE Numbering AuthorityNstrmonopub
vulnerability_cvss4_cna_saCVSSv4 Base Metrics Subsequent Availability Impact by CVE Numbering AuthorityNstrmonopub
vulnerability_cvss4_cna_sCVSSv4 Supplemental Metrics Safety by CVE Numbering AuthorityNstrmonopub
vulnerability_cvss4_cna_auCVSSv4 Supplemental Metrics Automatable by CVE Numbering AuthorityYstrmonopub
vulnerability_cvss4_cna_rCVSSv4 Supplemental Metrics Recovery by CVE Numbering AuthorityUstrmonopub
vulnerability_cvss4_cna_vCVSSv4 Supplemental Metrics Value Density by CVE Numbering AuthorityDstrmonopub
vulnerability_cvss4_cna_reCVSSv4 Supplemental Metrics Response Effort by CVE Numbering AuthorityLstrmonopub
vulnerability_cvss4_cna_uCVSSv4 Supplemental Metrics Provider Urgency by CVE Numbering AuthorityGreenstrmonopub
vulnerability_cvss4_cna_eCVSSv4 Threats Metrics Exploit Maturity by CVE Numbering AuthorityPstrmonopub
vulnerability_cvss3_meta_basescoreCVSSv3 Base Meta Score calculation of all available risk sources7.8num (0.0-10.0)monopub
vulnerability_cvss3_meta_tempscoreCVSSv3 Temp Meta Score calculation of all available risk sources7.8num (0.0-10.0)monopub
vulnerability_cvss3_vuldb_confidenceCVSSv3 Base Score confidence by VulDBHighstrvirtpub
vulnerability_cvss3_vuldb_basescoreCVSSv3 Base Score calculation by VulDB7.8num (0.0-10.0)monopub
vulnerability_cvss3_vuldb_tempscoreCVSSv3 Temp Score calculation by VulDB7.8num (0.0-10.0)monopub
vulnerability_cvss3_vuldb_basevectorCVSSv3 Base Vector generation by VulDBAV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:Lstrvirtpub
vulnerability_cvss3_vuldb_tempvectorCVSSv3 Temp Vector generation by VulDBE:X/RL:O/RC:Cstrvirtpub
vulnerability_cvss3_vuldb_baseseverityCVSSv3 Base Score Severity representation by VulDBHighstrvirtpub
vulnerability_cvss3_vuldb_tempseverityCVSSv3 Temp Score Severity representation by VulDBHighstrvirtpub
vulnerability_cvss3_vuldb_avCVSSv3 Base Score Access Vector by VulDBNstrmonopub
vulnerability_cvss3_vuldb_acCVSSv3 Base Score Attack Complexity by VulDBLstrmonopub
vulnerability_cvss3_vuldb_prCVSSv3 Base Score Privileges Required by VulDBLstrmonopub
vulnerability_cvss3_vuldb_uiCVSSv3 Base Score User Interactivity Required by VulDBNstrmonopub
vulnerability_cvss3_vuldb_sCVSSv3 Base Score Scope Change by VulDBCstrmonopub
vulnerability_cvss3_vuldb_cCVSSv3 Base Score Confidientality Impact by VulDBHstrmonopub
vulnerability_cvss3_vuldb_iCVSSv3 Base Score Integrity Impact by VulDBHstrmonopub
vulnerability_cvss3_vuldb_aCVSSv3 Base Score Availability Impact by VulDBHstrmonopub
vulnerability_cvss3_vuldb_rcCVSSv3 Base Score Report Confidence by VulDBCstrmonopub
vulnerability_cvss3_vuldb_rlCVSSv3 Base Score Remediation Level by VulDBOstrmonopub
vulnerability_cvss3_vuldb_eCVSSv3 Base Score Exploitability (Exploit Code Maturity) by VulDBPstrmonopub
vulnerability_cvss3_vendor_basescoreCVSSv3 Base Score calculation by Vendor7.8num (0.0-10.0)monopub
vulnerability_cvss3_vendor_tempscoreCVSSv3 Temp Score calculation by Vendor7.6num (0.0-10.0)monopub
vulnerability_cvss3_vendor_basevectorCVSSv3 Base Vector generation by VendorAV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:Lstrvirtpub
vulnerability_cvss3_vendor_tempvectorCVSSv3 Temp Vector generation by VendorE:X/RL:O/RC:Cstrvirtpub
vulnerability_cvss3_vendor_baseseverityCVSSv3 Base Score Severity representation by VendorHighstrvirtpub
vulnerability_cvss3_vendor_tempseverityCVSSv3 Temp Score Severity representation by VendorHighstrvirtpub
vulnerability_cvss3_vendor_avCVSSv3 Base Score Access Vector by VendorNstrmonopub
vulnerability_cvss3_vendor_acCVSSv3 Base Score Attack Complexity by VendorLstrmonopub
vulnerability_cvss3_vendor_prCVSSv3 Base Score Privileges Required by VendorLstrmonopub
vulnerability_cvss3_vendor_uiCVSSv3 Base Score User Interactivity Required by VendorNstrmonopub
vulnerability_cvss3_vendor_sCVSSv3 Base Score Scope Change by VendorCstrmonopub
vulnerability_cvss3_vendor_cCVSSv3 Base Score Confidientality Impact by VendorHstrmonopub
vulnerability_cvss3_vendor_iCVSSv3 Base Score Integrity Impact by VendorHstrmonopub
vulnerability_cvss3_vendor_aCVSSv3 Base Score Availability Impact by VendorHstrmonopub
vulnerability_cvss3_vendor_rcCVSSv3 Base Score Report Confidence by VendorCstrmonopub
vulnerability_cvss3_vendor_rlCVSSv3 Base Score Remediation Level by VendorOstrmonopub
vulnerability_cvss3_vendor_eCVSSv3 Base Score Exploitability (Exploit Code Maturity) by VendorPstrmonopub
vulnerability_cvss3_researcher_basescoreCVSSv3 Base Score calculation by Rersearcher7.8num (0.0-10.0)monopub
vulnerability_cvss3_researcher_tempscoreCVSSv3 Temp Score calculation by Rersearcher7.6num (0.0-10.0)monopub
vulnerability_cvss3_researcher_basevectorCVSSv3 Base Vector generation by ResearcherAV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:Lstrvirtpub
vulnerability_cvss3_researcher_tempvectorCVSSv3 Temp Vector generation by ResearcherE:X/RL:O/RC:Cstrvirtpub
vulnerability_cvss3_researcher_baseseverityCVSSv3 Base Score Severity representation by ResearcherHighstrvirtpub
vulnerability_cvss3_researcher_tempseverityCVSSv3 Temp Score Severity representation by ResearcherHighstrvirtpub
vulnerability_cvss3_researcher_avCVSSv3 Base Score Access Vector by ResearcherNstrmonopub
vulnerability_cvss3_researcher_acCVSSv3 Base Score Attack Complexity by ResearcherLstrmonopub
vulnerability_cvss3_researcher_prCVSSv3 Base Score Privileges Required by ResearcherLstrmonopub
vulnerability_cvss3_researcher_uiCVSSv3 Base Score User Interactivity Required by ResearcherNstrmonopub
vulnerability_cvss3_researcher_sCVSSv3 Base Score Scope Change by ResearcherCstrmonopub
vulnerability_cvss3_researcher_cCVSSv3 Base Score Confidientality Impact by ResearcherHstrmonopub
vulnerability_cvss3_researcher_iCVSSv3 Base Score Integrity Impact by ResearcherHstrmonopub
vulnerability_cvss3_researcher_aCVSSv3 Base Score Availability Impact by ResearcherHstrmonopub
vulnerability_cvss3_researcher_rcCVSSv3 Base Score Report Confidence by ResearcherCstrmonopub
vulnerability_cvss3_researcher_rlCVSSv3 Base Score Remediation Level by ResearcherOstrmonopub
vulnerability_cvss3_researcher_eCVSSv3 Base Score Exploitability (Exploit Code Maturity) by VendorPstrmonopub
vulnerability_cvss3_nvd_basescoreCVSSv3 Base Score calculation by NIST NVD7.8num (0.0-10.0)monopub
vulnerability_cvss3_nvd_tempscoreCVSSv3 Temp Score calculation by NIST NVD7.6num (0.0-10.0)monopub
vulnerability_cvss3_nvd_basevectorCVSSv3 Base Vector generation by NIST NVDAV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:Lstrvirtpub
vulnerability_cvss3_nvd_tempvectorCVSSv3 Temp Vector generation by NIST NVDE:X/RL:O/RC:Cstrvirtpub
vulnerability_cvss3_nvd_baseseverityCVSSv3 Base Score Severity representation by NIST NVDHighstrvirtpub
vulnerability_cvss3_nvd_tempseverityCVSSv3 Temp Score Severity representation by NIST NVDHighstrvirtpub
vulnerability_cvss3_nvd_avCVSSv3 Base Score Access Vector by NIST NVDNstrmonopub
vulnerability_cvss3_nvd_acCVSSv3 Base Score Attack Complexity by NIST NVDLstrmonopub
vulnerability_cvss3_nvd_prCVSSv3 Base Score Privileges Required by NIST NVDLstrmonopub
vulnerability_cvss3_nvd_uiCVSSv3 Base Score User Interactivity Required by NIST NVDNstrmonopub
vulnerability_cvss3_nvd_sCVSSv3 Base Score Scope Change by NIST NVDCstrmonopub
vulnerability_cvss3_nvd_cCVSSv3 Base Score Confidientality Impact by NIST NVDHstrmonopub
vulnerability_cvss3_nvd_iCVSSv3 Base Score Integrity Impact by NIST NVDHstrmonopub
vulnerability_cvss3_nvd_aCVSSv3 Base Score Availability Impact by NIST NVDHstrmonopub
vulnerability_cvss3_nvd_rcCVSSv3 Base Score Report Confidence by NIST NVDCstrmonopub
vulnerability_cvss3_nvd_rlCVSSv3 Base Score Remediation Level by NIST NVDOstrmonopub
vulnerability_cvss3_nvd_eCVSSv3 Base Score Exploitability (Exploit Code Maturity) by VendorPstrmonopub
vulnerability_cvss3_cna_basescoreCVSSv3 Base Score calculation by responsible CVE Numbering Authority7.8num (0.0-10.0)monopub
vulnerability_cvss3_cna_tempscoreCVSSv3 Temp Score calculation by responsible CVE Numbering Authority7.6num (0.0-10.0)monopub
vulnerability_cvss3_cna_basevectorCVSSv3 Base Vector generation by responsible CVE Numbering AuthorityAV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:Lstrvirtpub
vulnerability_cvss3_cna_tempvectorCVSSv3 Temp Vector generation by responsible CVE Numbering AuthorityE:X/RL:O/RC:Cstrvirtpub
vulnerability_cvss3_cna_baseseverityCVSSv3 Base Score Severity representation by responsible CVE Numbering AuthorityHighstrvirtpub
vulnerability_cvss3_cna_tempseverityCVSSv3 Temp Score Severity representation by responsible CVE Numbering AuthorityHighstrvirtpub
vulnerability_cvss3_cna_avCVSSv3 Base Score Access Vector by responsible CVE Numbering AuthorityNstrmonopub
vulnerability_cvss3_cna_acCVSSv3 Base Score Attack Complexity by responsible CVE Numbering AuthorityLstrmonopub
vulnerability_cvss3_cna_prCVSSv3 Base Score Privileges Required by responsible CVE Numbering AuthorityLstrmonopub
vulnerability_cvss3_cna_uiCVSSv3 Base Score User Interactivity Required by responsible CVE Numbering AuthorityNstrmonopub
vulnerability_cvss3_cna_sCVSSv3 Base Score Scope Change by responsible CVE Numbering AuthorityCstrmonopub
vulnerability_cvss3_cna_cCVSSv3 Base Score Confidientality Impact by responsible CVE Numbering AuthorityHstrmonopub
vulnerability_cvss3_cna_iCVSSv3 Base Score Integrity Impact by responsible CVE Numbering AuthorityHstrmonopub
vulnerability_cvss3_cna_aCVSSv3 Base Score Availability Impact by responsible CVE Numbering AuthorityHstrmonopub
vulnerability_cvss3_cna_rcCVSSv3 Base Score Report Confidence by responsible CVE Numbering AuthorityCstrmonopub
vulnerability_cvss3_cna_rlCVSSv3 Base Score Remediation Level by responsible CVE Numbering AuthorityOstrmonopub
vulnerability_cvss3_cna_eCVSSv3 Base Score Exploitability (Exploit Code Maturity) by VendorPstrmonopub
vulnerability_cvss2_vuldb_basescoreCVSSv2 Base Score by VulDB6.6num (0.0-10.0)monopub
vulnerability_cvss2_vuldb_tempscoreCVSSv2 Temp Score by VulDB6.2num (0.0-10.0)monopub
vulnerability_cvss2_vuldb_baseseverityCVSSv2 Base Score Severity representation by VulDBMediumstrvirtpub
vulnerability_cvss2_vuldb_tempseverityCVSSv2 Temp Score Severity representation by VulDBMediumstrvirtpub
vulnerability_cvss2_vuldb_avCVSSv2 Base Score Access Vector by VulDBNstrmonopub
vulnerability_cvss2_vuldb_acCVSSv2 Base Score Access Complexity by VulDBMstrmonopub
vulnerability_cvss2_vuldb_auCVSSv2 Base Score Authentication by VulDBSstrmonopub
vulnerability_cvss2_vuldb_ciCVSSv2 Base Score Confidientality Impact by VulDBCstrmonopub
vulnerability_cvss2_vuldb_iiCVSSv2 Base Score Integrity Impact by VulDBCstrmonopub
vulnerability_cvss2_vuldb_aiCVSSv2 Base Score Availability Impact by VulDBCstrmonopub
vulnerability_cvss2_vuldb_rcCVSSv2 Base Score Report Confidence by VulDBCstrmonopub
vulnerability_cvss2_vuldb_rlCVSSv2 Base Score Remediation Level by VulDBOFstrmonopub
vulnerability_cvss2_vuldb_eCVSSv2 Base Score Exploitability by VulDBPOCstrmonopub
vulnerability_cvss2_vendor_basescoreCVSSv2 Base Score by Vendor6.6num (0.0-10.0)monopub
vulnerability_cvss2_vendor_tempscoreCVSSv2 Temp Score by Vendor6.2num (0.0-10.0)monopub
vulnerability_cvss2_vendor_baseseverityCVSSv2 Base Score Severity representation by VendorMediumstrvirtpub
vulnerability_cvss2_vendor_tempseverityCVSSv2 Temp Score Severity representation by VendorMediumstrvirtpub
vulnerability_cvss2_vendor_avCVSSv2 Base Score Access Vector by VendorNstrmonopub
vulnerability_cvss2_vendor_acCVSSv2 Base Score Access Complexity by VendorMstrmonopub
vulnerability_cvss2_vendor_auCVSSv2 Base Score Authentication by VendorSstrmonopub
vulnerability_cvss2_vendor_ciCVSSv2 Base Score Confidientality Impact by VendorCstrmonopub
vulnerability_cvss2_vendor_iiCVSSv2 Base Score Integrity Impact by VendorCstrmonopub
vulnerability_cvss2_vendor_aiCVSSv2 Base Score Availability Impact by VendorCstrmonopub
vulnerability_cvss2_vendor_rcCVSSv2 Base Score Report Confidence by VendorCstrmonopub
vulnerability_cvss2_vendor_rlCVSSv2 Base Score Remediation Level by VendorOFstrmonopub
vulnerability_cvss2_vendor_eCVSSv2 Base Score Exploitability by VendorPOCstrmonopub
vulnerability_cvss2_researcher_basescoreCVSSv2 Base Score by Researcher6.6num (0.0-10.0)monopub
vulnerability_cvss2_researcher_tempscoreCVSSv2 Temp Score by Researcher6.2num (0.0-10.0)monopub
vulnerability_cvss2_researcher_baseseverityCVSSv2 Base Score Severity representation by ResearcherMediumstrvirtpub
vulnerability_cvss2_researcher_tempseverityCVSSv2 Temp Score Severity representation by ResearcherMediumstrvirtpub
vulnerability_cvss2_researcher_avCVSSv2 Base Score Access Vector by ResearcherNstrmonopub
vulnerability_cvss2_researcher_acCVSSv2 Base Score Access Complexity by ResearcherMstrmonopub
vulnerability_cvss2_researcher_auCVSSv2 Base Score Authentication by ResearcherSstrmonopub
vulnerability_cvss2_researcher_ciCVSSv2 Base Score Confidientality Impact by ResearcherCstrmonopub
vulnerability_cvss2_researcher_iiCVSSv2 Base Score Integrity Impact by ResearcherCstrmonopub
vulnerability_cvss2_researcher_aiCVSSv2 Base Score Availability Impact by ResearcherCstrmonopub
vulnerability_cvss2_researcher_rcCVSSv2 Base Score Report Confidence by ResearcherCstrmonopub
vulnerability_cvss2_researcher_rlCVSSv2 Base Score Remediation Level by ResearcherOFstrmonopub
vulnerability_cvss2_researcher_eCVSSv2 Base Score Exploitability by ResearcherPOCstrmonopub
vulnerability_cvss2_nvd_basescoreCVSSv2 Base Score by NIST NVD6.6num (0.0-10.0)monopub
vulnerability_cvss2_nvd_tempscoreCVSSv2 Temp Score by NIST NVD6.2num (0.0-10.0)monopub
vulnerability_cvss2_nvd_baseseverityCVSSv2 Base Score Severity representation by NVDMediumstrvirtpub
vulnerability_cvss2_nvd_tempseverityCVSSv2 Temp Score Severity representation by NVDMediumstrvirtpub
vulnerability_cvss2_nvd_avCVSSv2 Base Score Access Vector by NIST NVDNstrmonopub
vulnerability_cvss2_nvd_acCVSSv2 Base Score Access Complexity by NIST NVDMstrmonopub
vulnerability_cvss2_nvd_auCVSSv2 Base Score Authentication by NIST NVDSstrmonopub
vulnerability_cvss2_nvd_ciCVSSv2 Base Score Confidientality Impact by NIST NVDCstrmonopub
vulnerability_cvss2_nvd_iiCVSSv2 Base Score Integrity Impact by NIST NVDCstrmonopub
vulnerability_cvss2_nvd_aiCVSSv2 Base Score Availability Impact by NIST NVDCstrmonopub
vulnerability_cvss2_nvd_rcCVSSv2 Base Score Report Confidence by NIST NVDCstrmonopub
vulnerability_cvss2_nvd_rlCVSSv2 Base Score Remediation Level by NIST NVDOFstrmonopub
vulnerability_cvss2_nvd_eCVSSv2 Base Score Exploitability by NIST NVDPOCstrmonopub
vulnerability_bugbounty_organizationName of the organization that disclosed a bug bounty for the vulnerabilityGooglestrmonopub
vulnerability_bugbounty_pricePayout price of the bug bounty for the vulnerabilityUSD 5000strmonopub
vulnerability_bugbounty_payoutdateDate of the payout of the bug bounty for the vulnerability1454427609strtstamppub
vulnerability_sourcecodeSource code snippet of affected partsstr (multiline possible)monopub
vulnerability_advisoryquoteQuote about the vulnerability from the original advisoryThe issue got verified by the core developers right after the initial notification.strmonopub
vulnerability_freetextenAdditional text describing the vulnerability (English)strmonopub
vulnerability_freetextdeAdditional text describing the vulnerability (German)strmonopub
advisory_dateUnix timestamp of the disclosure date1097625600tstampmonopub
advisory_locationName of the location of the initial disclosureWebsitestrmonopub
advisory_typeType of the initial disclosureAdvisorystrmonopub
advisory_urlURL of the initial disclosurehttp://www.example.com/advisory.php?id=42str urlmonopub
advisory_unavailableThe reason why a source is not availableacquired by Oraclestrvirtpub
advisory_viaDisclosure via a vulnerability broker ZDIstrmonopub
advisory_identifierUnique identifier of the advisoryMS-ADV:2016-42str/arrmonopub
advisory_reportconfidenceCVSSv2 and CVSSv3 Base Score ConfidenceCstrmonopub
advisory_coordinationCoordinated disclosure (1=yes, 0=no)1bool (0, 1)monopub
advisory_person_nameName of the person that found the issueJohn Doestr/arrmonopub
advisory_person_nicknameNickname of the person that found the issueDr. Sashimistr/arrmonopub
advisory_person_mailEmail of the person that found the issuesashimi@example.comstr mail addressmonopub
advisory_person_websiteWebsite of the person that found the issuehttps://sashimi.example.comstr urlmonopub
advisory_company_nameName of the company of the person that found the issueSashimi Ltd.str/arrmonopub
advisory_reaction_dateUnix timestamp of the reaction of the vendor towards of the finding1097625600tstampmonopub
advisory_confirm_urlURL of the vendor confirmation of the vulnerabilityhttp://www.microsoft.com/...str urlmonopub
advisory_confirm_dateDate of the vendor confirmation of the vulnerability1097625600tstampmonopub
advisory_confirm_unavailableThe reason why a source is not availabledefunct due to bankruptcystrvirtpub
advisory_disputedThe issue is disputed (1=yes, 0=no)1bool (0, 1)monopub
advisory_falsepositiveThe issue is a false-positive (1=yes, 0=no)0bool (0, 1)monopub
advisory_advisoryquoteQuote about the disclosure from the original advisorystrmonopub
advisory_freetextenAdditional text describing the disclosure0 (English)strmonopub
advisory_freetextdeAdditional text describing the disclosure (German)strmonopub
exploit_availabilityAvailability of the exploit (1=yes, 0=no)1bool (0, 1)monopub
exploit_dateUnix timestamp of the first release of a public exploit1097625600tstampmonopub
exploit_publicityPublicity of the exploit (e.g. public, private)privatestrmonopub
exploit_urlURL of the exploithttps://sashimi.example.com/exploit.php?id=23str urlmonopub
exploit_unavailableThe reason why a source is not availablediscontinuedstrvirtpub
exploit_developer_nameName of the person that created the exploitJohn Doestr/arrmonopub
exploit_developer_nicknameNickname of the person that created the exploitDr. Sashimistr/arrmonopub
exploit_developer_mailEmail of the person that created the exploitsashimi@example.comstr mail addressmonopub
exploit_developer_websiteWebsite of the person that created the exploithttps://sashimi.example.comstr urlmonopub
exploit_languageProgramming language of the exploitPythonstrmonopub
exploit_exploitabilityExploitability level of the exploitPOCstrmonopub
exploit_reliabilityReliability of the exploit (0-100)99num (0-100)monopub
exploit_wormifiedExploit got used within an automated worm (1=yes, 0=no)1bool (0, 1)monopub
exploit_googlehackstr for Google dorkinurl:ssl.aspxstrmonopub
exploit_epss_scoreCurrent prediction score of EPSS (Exploit Prediction Scoring System)0.03444num (float)virtpub
exploit_epss_percentilePercentile of CVE within current EPSS (Exploit Prediction Scoring System)0.83482num (float)virtpub
exploit_price_0dayKnown or estimated 0-day price of the exploit$50k-$100kstrmonopub
exploit_price_todayKnown or estimated price of the exploit as of today (updated daily)$10k-$25kstrvirtpub
exploit_price_trendWill exploit prices rise or drop in the future+strmonopub
exploit_price_timelineNot available yetstr arrvirtint
exploit_kev_vendorprojectVendor or project associated with the CISA Known Exploited Vulnerabilities Catalog entryMicrosoftstrmonopub
exploit_kev_productProduct associated with the CISA Known Exploited Vulnerabilities Catalog entryWindowsstrmonopub
exploit_kev_vulnerabilitynameName of the vulnerability associated with the CISA Known Exploited Vulnerabilities Catalog entryMicrosoft Windows Internet Shortcut Files Security Feature Bypass Vulnerabilitystrmonopub
exploit_kev_shortdescriptionShort description associated with the CISA Known Exploited Vulnerabilities Catalog entryA privilege elevation vulnerability exists in the POSIX subsystem. This vulnerability could allow a logged on user to take complete control of the system.strmonopub
exploit_kev_addedDate of entry added to CISA Known Exploited Vulnerabilities Catalog2024-02-11str (YYYY-mm-dd)monopub
exploit_kev_dueDate of expected due date to deploy countermeasures with the CISA Known Exploited Vulnerabilities Catalog entry2024-03-16str (YYYY-mm-dd)monopub
exploit_kev_requiredactionRecommended countermeasure associated with the CISA Known Exploited Vulnerabilities Catalog entryApply updates per vendor instructions.strmonopub
exploit_kev_knownransomwareStatus if there is a known ransomware campain associated with the CISA Known Exploited Vulnerabilities Catalog entryKnownstrmonopub
exploit_kev_notesAdditional notes associated with the CISA Known Exploited Vulnerabilities Catalog entryKnownstrmonopub
exploit_advisoryquoteQuote about the exploit from the original advisorystrmonopub
exploit_sourcecodeSource code snippet of the exploitstr (multiline possible)monopub
exploit_freetextenAdditional text describing the exploit (English)strmonopub
exploit_freetextdeAdditional text describing the exploit (German)strmonopub
countermeasure_remediationlevelGeneric remediation level descriptionofficial fixstrvirtpub
countermeasure_nameName of the suggested countermeasureUpgradestrmonopub
countermeasure_dateUnix timestamp of the release of the first countermeasure1097625600tstampmonopub
countermeasure_reliabilityReliability of the countermeasure (0-100)99num (0-100)monopub
countermeasure_reactiondaysDays of reaction between vendor notification and disclosure/countermeasure13numvirtpub
countermeasure_exposuredaysDays of public exposure between public dicsloure and countermeasure23numvirtpub
countermeasure_0daydaysDays of 0day lifecycle before any kind of disclosure5numvirtpub
countermeasure_exploitdelaydaysDays between disclosure and first exploit availability7numvirtpub
countermeasure_upgrade_versionFirst known unaffected version(s)10/Server 2003str/arrmonopub
countermeasure_upgrade_urlURL of the upgraded versionhttps://windowsupdate.microsoft.comstr urlmonopub
countermeasure_upgrade_unavailableThe reason why a source is not availabledefunctstrvirtpub
countermeasure_patch_nameName of the patchMS16-099str/arrmonopub
countermeasure_patch_urlURL of the patchhttps://technet.microsoft.com/library/security/MS16-099strmonopub
countermeasure_patch_unavailableThe reason why a source is not availabledefunctstrvirtpub
countermeasure_config_settingConfig setting to eliminate the vulnerabilityAllowSHA1=FALSEstrmonopub
countermeasure_firewalling_portFirewall port(s) to eliminate the vulnerabilitytcp/80 (http) & tcp/443 (https)strmonopub
countermeasure_authentication_nameAdditional authentication(s) to eliminate the vulnerability.htaccessstr/arrmonopub
countermeasure_encryption_nameAdditional encryption(s) to eliminate the vulnerabilityIPsecstr/arrmonopub
countermeasure_workaround_nameName of the workaround(s) to eliminate the vulnerabilityChange the Templatestr/arrmonopub
countermeasure_workaround_urlURL of the workaround(s) to eliminate the vulnerabilityhttps://example.comstrmonopub
countermeasure_workaround_unavailableThe reason why a source is not availabledefunctstrvirtpub
countermeasure_alternative_nameAlternative products that provide similar features without this vulnerabilityMozilla Firefox, Google Chromestr/arrmonopub
countermeasure_sourcecodeSource code snippet of the countermeasurestr (multiline possible)monopub
countermeasure_advisoryquoteQuote about the countermeasure from the original advisorystrmonopub
countermeasure_freetextenAdditional text describing the countermeasure (English)strmonopub
countermeasure_freetextdeAdditional text describing the countermeasure (German)strmonopub
source_cveCVE IDCVE-2016-1234strmonopub
source_cve_assignedUnix timestamp of the CVE assignment1108857600tstampmonopub
source_cve_nvd_publishedUnix timestamp of the CVE published on NVD1097539200tstampmonopub
source_cve_nvd_summaryCVE summary provided on NVDSome web servers under Microsoft Windows allow remote attackers to bypass access restrictions for files with long file names.strmonopub
source_cve_cnaResponsible CVE Numbering Authority (CNA) responsible for maintaining the CVE entryMITREstrmonopub
source_cve_duplicateList of all duplicate CVEs that were also assignedCVE-2021-36545str/arrmonopub
source_cve_duplicateofList of all CVEs that this CVE might be a duplicate ofCVE-2023-0946str/arrmonopub
source_oval_idOVAL IDoval:org.mitre.oval:def:14735strmonopub
source_iavm_idIAVM2011-A-0167strmonopub
source_iavm_vmskeyIAVM VMSKEYV0030830strmonopub
source_iavm_titleIAVM titleMicrosoft Cumulative Security Update of ActiveX Kill Bitsstrmonopub
source_osvdb_idOSVDB ID12914nummonopub
source_osvdb_createUnix timestamp of the OSVDB entry creation1104710400tstampmonopub
source_osvdb_titleOSVDB titleWindows Kernel Multiprocessor Page Fault Handler Race Conditionstrmonopub
source_osvdb_unavailableThe reason why a source is not availablediscontinuedstrvirtpub
source_secunia_idSecunia ID13822nummonopub
source_secunia_dateUnix timestamp of the Secunia entry creation1104710400tstampmonopub
source_secunia_titleSecunia titleWindows Kernel Page Fault Handler Privilege Escalationstrmonopub
source_secunia_riskSecunia risk levelLess Criticalstrmonopub
source_secunia_unavailableThe reason why a source is not availableacquired by Flexerastrvirtpub
source_securityfocus_idSecurityFocus ID12244nummonopub
source_securityfocus_dateUnix timestamp of the SecurityFocus entry creation1104710400tstampmonopub
source_securityfocus_classSecurityFocus vulnerability classInput Validation Errorstrmonopub
source_securityfocus_titleSecurityFocus titleWindows Remote Format String Vulnerabilitystrmonopub
source_sectracker_idSecurityTracker ID1012862nummonopub
source_sectracker_dateUnix timestamp of the SecurityTracker entry creation1105488000tstampmonopub
source_sectracker_titleSecurityTracker titleWindows Kernel Multiprocessor Page Fault Handler Race Condition Lets Local Users Gain Elevated Privilegesstrmonopub
source_sectracker_causeSecurityTracker causeAccess control errorstrmonopub
source_sectracker_unavailableThe reason why a source is not availablediscontinuedstrvirtpub
source_vulnerabilitycenter_idVulnerability Center ID51222nummonopub
source_vulnerabilitycenter_titleVulnerability Center titleWindows Kernel Multiprocessor Page Fault Handler Race Condition Lets Local Users Gain Elevated Privilegesstrmonopub
source_vulnerabilitycenter_severityVulnerability Center severityMediumstrmonopub
source_vulnerabilitycenter_creationdateUnix timestamp of the Vulnerability Center entry creation1105488000tstampmonopub
source_vulnerabilitycenter_lastupdateUnix timestamp of the Vulnerability Center entry last update1105488000tstampmonopub
source_vulnerabilitycenter_reportingdateUnix timestamp of the Vulnerability Center reporting date1105488000tstampmonopub
source_vupen_idVupen IDADV-2009-1233 strmonopub
source_vupen_unavailableThe reason why a source is not availabledefunctstrvirtpub
source_xforce_idIBM X-Force ID11695nummonopub
source_xforce_dateUnix timestamp of the IBM X-Force entry creation1105488000tstampmonopub
source_xforce_titleIBM X-Force titleWindows LF (Line Feed) denial of servicestrmonopub
source_xforce_identifierIBM X-Force identifiermicrosoft-http-lf-dosstrmonopub
source_xforce_riskIBM X-Force risk (obsolete since 2015)Medium Riskstrmonopub
source_zerodaycz_idZero-day.cz ID889nummonopub
source_zerodaycz_titleZero-day.cz titleInformation disclosure in Check Point Quantum Gatewaystrmonopub
source_cert_vuCERT VU252068nummonopub
source_securiteam_urlSecuriTeam.com URLhttp://www.securiteam.com/windowsntfocus/5MP0F1F95U.htmlstr urlmonopub
source_securiteam_unavailableThe reason why a source is not availablediscontinuedstrvirtpub
source_cnnvd_idCNNVD IDCNNVD-202403-298strmonopub
source_cnnvd_nameCNNVD titleJetBrains TeamCity 安全漏洞strmonopub
source_cnnvd_hazardlevelCNNVD risk1nummonopub
source_cnnvd_createTimestamp of the CNNVD entry creation2024-03-05str (YYYY-mm-dd)monopub
source_cnnvd_publishTimestamp of the CNNVD entry disclosure2024-03-05str (YYYY-mm-dd)monopub
source_cnnvd_updateTimestamp of the CNNVD entry update2024-03-05str (YYYY-mm-dd)monopub
source_exploitdb_idExploit-DB ID37932nummonopub
source_exploitdb_dateUnix timestamp of the Exploit-DB entry creation1105488000tstampmonopub
source_milw0rm_idMilw0rm ID37932nummonopub
source_milw0rm_unavailableThe reason why a source is not availablediscontinuedstrvirtpub
source_0daytoday_id0day.today ID37932nummonopub
source_0daytoday_dateUnix timestamp of the 0day.today entry creation1105488000tstampmonopub
source_0daytoday_titleUnix timestamp of the 0day.today entry creation1105488000tstampmonopub
source_heise_idHeise.de URL ID44502nummonopub
source_tecchannel_idTecchannel URL ID (obsolete)2093strmonopub
source_nessus_idNessus ID88647nummonopub
source_nessus_nameNessus plugin titleMS16-015: Security Update for Microsoft Office to Address Remote Code Execution (3134226)strmonopub
source_nessus_filenameNessus plugin filenamemicrosoft_windows_ssl.naslstrmonopub
source_nessus_riskNessus riskCriticalstrmonopub
source_nessus_familyNessus familyWindows : Microsoft Bulletinsstrmonopub
source_nessus_typeNessus plugin typeremotestrmonopub
source_nessus_portNessus plugin port445strmonopub
source_nessus_dateNessus plugin date1105488000tstampmonopub
source_pvs_idPVS ID8276nummonopub
source_pvs_titlePVS titleWindows Multiple Vulnerabilitiesstrmonopub
source_pvs_riskPVS riskHighstrmonopub
source_pvs_familyPVS familyWindowsstrmonopub
source_openvas_idOpenVAS ID881920nummonopub
source_openvas_filenameOpenVAS filenamegb_CESA-2014_0383_samba4_centos6.naslstrmonopub
source_openvas_titleOpenVAS titleWindows Update for samba4 CESA-2014:0383strmonopub
source_openvas_familyOpenVAS familyWindows Local Security Checksstrmonopub
source_qualys_idQualys ID38370nummonopub
source_qualys_titleQualys titleWindows Privilege Escalation Vulnerabilitystrmonopub
source_saint_idSAINT IDexploit_info/iis5_webdavstrmonopub
source_saint_titleSAINT titlentdll.dll buffer overflow via IIS 5.0 WebDAVstrmonopub
source_saint_linkSAINT linkhttp://www.saintcorporation.com/cgi-bin/exploit_info/iis5_webdavstrmonopub
source_msf_idMetasploit IDms03_007_ntdll_webdav.rbstrmonopub
source_msf_filenameMetasploit filenamemetasploit-framework/modules/exploits/windows/iis/ms03_007_ntdll_webdav.rbstrmonopub
source_msf_titleMetasploit titleMS03-007 Microsoft IIS 5.0 WebDAV ntdll.dll Path Overflowstrmonopub
source_d2sec_urlD2 Elliot URLhttp://www.d2sec.com/exploits/vbulletin_4.1.x_rce.htmlstr urlmonopub
source_d2sec_titleD2 Elliot titlevBulletin 4.1.x RCEstrmonopub
source_d2sec_descD2 Elliot descriptionRemote command execution vulnerability in vBulletin upgrade.phpstrmonopub
source_d2sec_familyD2 Elliot familyRemote Command Executionstrmonopub
source_atk_idATK ID99nummonopub
source_snort_idSnort ID2090nummonopub
source_snort_classSnort classattempted-adminstrmonopub
source_snort_messageSnort messageSERVER-IIS WEBDAV exploit attemptstrmonopub
source_snort_patternSnort pattern}SNORT-strmonopub
source_suricata_idSuricata ID2002844nummonopub
source_suricata_sigSuricata signatureET WEB_SERVER WebDAV search overflowstrmonopub
source_suricata_classSuricata classweb-applicationstrmonopub
source_sourcefire_ips_idSourcefire IPS ID8427nummonopub
source_issproventia_idISS Proventia ID2118084nummonopub
source_tippingpoint_idTippingpoint ID4725nummonopub
source_tippingpoint_titleTippingpoint titleHTTP: AOL ICQ ActiveX Control Code Execution (ZDI-06-037)strmonopub
source_tippingpoint_categoryTippingpoint categoryVulnerabilitiesstrmonopub
source_mcafee_ips_idMcAfee IPS IDDNS: ISC BIND Resolver Library Buffer Overflow Vulnerabilitystrmonopub
source_mcafee_ips_versionMcAfee IPS version8.1.38.3strmonopub
source_paloalto_ips_idPalo-Alto IPS ID30354nummonopub
source_fortigate_ips_idFortigate IPS ID12718nummonopub
source_screenshotScreenshot of the vulnerability and/or attackexample_screenshot.jpgstr filenamevirtpub
source_videolinkLink to video describing or showing the attack (Youtube, Vimeo, etc.)https://youtu.be/GsCpyUJDyjQstr urlmonopub
source_sciplabsLink to recommended scip Labs entryhttps://www.scip.ch/en/?labs.20191010str urlvirtpub
source_miscMisc. Linkhttps://blog.exodusintel.com/2016/02/10/firewall-hacking/str urlmonopub
source_misc_unavailableThe reason why a source is not availabledefunctstrvirtpub
source_seealsoIDs of similar VulDB entries (if available)12354, 84635, 78413str arrmonopub
cti_activity_scoreCurrent activity score for the specific item4.38num (0.00-10.00)virtpub
cti_activity_trendForecast if the current activity score of the item will increase (+), decrease (-) or remain as it is+strvirtpub
cti_activity_countriesList of countries which are associated with latest activities of the itemus, cn, rustr arrvirtpub
cti_activity_actorsList of APT actors which are associated with latest activities of the itemConti, Black Basta, Carbanakstr arrvirtpub
cti_activity_ipaddrList of verified and predictive IP addresses associated with activity monitoring of this vulnerability123.123.123.0/2 234.234.234.0/24str arrvirtpub
cti_ioa_fileList of IOA (Indicator of Attack) which are of the class fileexample.phpstr arrvirtpub
cti_ioa_libraryList of IOA (Indicator of Attack) which are of the class librarylib_authenticate.cstr arrvirtpub
cti_ioa_argumentList of IOA (Indicator of Attack) which are of the class argumentusernamestr arrvirtpub
cti_ioa_inputvalueList of IOA (Indicator of Attack) which are of the class input valueEXECUTE_vuln(999)str arrvirtpub
cti_ioa_patternList of IOA (Indicator of Attack) which are of the class input value61 74 74 61 63 6B 20 73 74 72 69 6E 67strvirtpub
cti_ioa_networkportList of IOA (Indicator of Attack) which are of the class firewall porttcp/12345strvirtpub
cti_ttp_attckList of MITRE ATT&CK values associated with this vulnerability and attack campaignsT1505str arrvirtpub
cti_ttp_cweList of CWEs associated with this vulnerability and attack campaignsCWE-79, CWE-707, CWE-20str arrvirtpub
cti_ttp_capecList of CAPEC values associated with this vulnerability and attack campaignsCAPEC-108, CAPEC-10, CAPEC-250str arrvirtpub
cna_responsibleName of the CNA with the original scopeMicrosoftstr arrmonopublic (ro)
cna_contact_dateUnix timestamp of contacting the CNA1643366633tstampmonopublic (ro)
cna_response_dateUnix timestamp of the response by the CNA1643366633tstampmonopublic (ro)
cna_response_summaryDescription of the response by the CNAWe reject this issue because the feature works as intended.strmonopublic (ro)
cna_decision_dateUnix timestamp of our decision as CNA1643366633tstampmonopublic (ro)
cna_decision_summaryDescription of our decision as CNAWe overrule the vendor CNA because there is a risk for customers.strmonopublic (ro)
cna_eolFlagging products as not supported when assigned as demanded by the CVE program for EoL products1bool (0, 1)monopublic (ro)
cna_nocveFlagging entries as not eligible for CVE assignments according to our submission rules and/or the CNA rules1bool (0, 1)monopublic (ro)
legacy_titleLegacy title (old entries)(obsolete)strmonoint
legacy_affectedLegacy affected products (old entries)(obsolete)strmonoint
legacy_descriptionLegacy description (old entries)(obsolete)strmonoint
legacy_expertLegacy comment (old entries)(obsolete)strmonoint

Cyber Threat Intelligence

Using the CTI API requires additional access capabilities unlocked for the requesting user account. Accessing the CTI API consumes more API credits than accessing the Vulnerability API.

IP Addresses, Hostnames, Actors, Sectors

Ideal to lookup indicators for malicious activities and to analyze behavior of actors.

📥 Download Free API Response Sample

FieldTitleExampleTypeRepoAccess
ipv4IPv4 addresses associated with the actor192.168.0.1, 192.168.0.2str arrvirtpub
hostnameHostnames associated with the actorwww.example.com, test.example.comstr arrvirtpub
timestamp_reportedUnix timestamp of adding item to database1607986800tstampmetapub
timestamp_confirmedUnix timestamp of last confirmation of item1607986800tstampmetapub
risk_valueCurrent activity and risk level of the actor4.23num (0.00-10.00)virtpub
risk_nameCurrent activity and risk level of the actor readable for humansMediumstrvirtpub
attributionActor group attribution of the itemZegoststrvirtpub
associationActor country association of the itemus, cn, rustr arrvirtpub
vulnerabilityKnown vulnerabilities associated with the item (VulDB identifiers)199177, 205666, 206240num arrayvirtpub
ioa_fileIndicators of Attack based on file names associated with the itembackdoor.php, proxy.aspxstr arrvirtpub
ioa_libraryIndicators of Attack based on library names associated with the item/lib/auth.php, hidden.dllstr arrvirtpub
ioa_argumentIndicators of Attack based on argument names associated with the itemusername, password, adminstr arrvirtpub
ioa_input_valueIndicators of Attack based on input values associated with the item<script>, alert(1), /etc/passwdstr arrvirtpub
ioa_patternIndicators of Attack based on pattern values associated with the item|05 00 00|, abcdstr arrvirtpub
ioa_network_portIndicators of Attack based on network ports associated with the item37777, tcp/666str arrvirtpub
ttp_techniqueTactics, techniques, and procedures associated with the itemT1006, T1055, T1059.007str arrvirtpub
ttp_capecCAPEC-items associated with the item1, 10, 16str arrvirtpub
ttp_cweWeaknesses associated with the itemCWE-22, CWE-79, CWE-200str arrvirtpub
sourcesOnline sources associated with the item, actor, campaign or indicatorshttps://www.scip.ch/en/?labs.20210923str url arrvirtpub

Events

Helps you to determine ongoing activities and emerging threats.

📥 Download Free API Response Sample

FeldTitleExampleTypeRepoAccess
timestampUnix timestamp of beginning of event1660581175tstampvirtpub
titleTitle of eventActor Group in US review vendor Ciscostrvirtpub
summaryShort summary of eventDuring an analysis our CTI team identified an interesting event on 06:32 PM. It was possible to identify multiple members of an unknown group to be part of the activities. The center of attention is the vendor Cisco. This event is classified as General Danger.strvirtpub
typeType of eventgroupstrvirtpub
countryCountry involved in activitiesusstrvirtpub
focusFocus of activityvendorstrvirtpub
objectTargeted objectCiscostrvirtpub
vulnerabilityTargeted vulnerability1057numvirtpub
weightImportance of event131num (0-n)virtpub
riskRisk of identified eventGeneral Dangerstrvirtpub
detailsLink to the CTI platform which provides drilldown detailshttps://vuldb.com/?vendor.ciscostr urlvirtpub

更新済み: 2025年01月22日 キーワード: VulDB Documentation Team

Want to stay up to date on a daily basis?

Enable the mail alert feature now!