Skip to main content

API Endpoints

Health Check Endpoints​

Full Health Check​

GET /api/v1/ping

💰 Cost: 0 credits (free healthcheck)

Performs a comprehensive health check including database connectivity.

Headers:

  • X-API-Key: Required

Response:

{
"data": {
"status": "ok",
"timestamp": "2024-01-25T12:00:00Z",
"database": {
"connected": true,
"latency_ms": 15
}
},
"meta": {
"timestamp": "2024-01-25T12:00:00Z",
"version": "v1",
"correlationId": "req-12345"
}
}

Lightweight Health Check​

GET /api/v1/ping-lite

💰 Cost: 0 credits (free healthcheck)

Lightweight health check for high-frequency monitoring (sub-millisecond response).

Headers:

  • X-API-Key: Required

Response:

{
"data": {
"status": "ok",
"timestamp": "2024-01-25T12:00:00Z"
},
"meta": {
"timestamp": "2024-01-25T12:00:00Z",
"version": "v1",
"correlationId": "req-12345"
}
}

CVE Endpoints​

Get CVE Details​

GET /api/v1/cve/{cve-id}

💰 Cost: 5 credits

Retrieve detailed information about a specific CVE including all enrichment data.

Headers:

  • X-API-Key: Required

Path Parameters:

  • cve-id: CVE identifier (e.g., CVE-2024-0001)

Query Parameters:

  • fields (optional): Comma-separated list of fields to include in response
  • include (optional): Additional data to include. Options:
    • enrichment: Include CVE enrichment data
    • acsc: Include ACSC advisories
    • attack: Include MITRE ATT&CK® technique mappings
    • Multiple values can be combined: include=enrichment,attack

Example Request:

# Basic request
curl -H "X-API-Key: your-api-key-here" \
https://api.cybersecfeed.com/api/v1/cve/CVE-2024-0001

# With ATT&CK techniques only
curl -H "X-API-Key: your-api-key-here" \
"https://api.cybersecfeed.com/api/v1/cve/CVE-2021-44228?include=attack"

# With both enrichment and ATT&CK
curl -H "X-API-Key: your-api-key-here" \
"https://api.cybersecfeed.com/api/v1/cve/CVE-2021-44228?include=enrichment,attack"

# With all enrichment types for comprehensive analysis
curl -H "X-API-Key: your-api-key-here" \
"https://api.cybersecfeed.com/api/v1/cve/CVE-2021-44228?include=acsc,enrichment,attack"

Response:

{
"data": {
"cve": {
"id": "CVE-2024-0001",
"sourceIdentifier": "[email protected]",
"published": "2024-01-15T10:00:00Z",
"lastModified": "2024-01-16T14:30:00Z",
"description": "A vulnerability in...",
"cvss": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"cpe": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vendor:product:1.0:*:*:*:*:*:*:*"
}
],
"references": [
{
"url": "https://example.com/advisory",
"source": "[email protected]"
}
],
"kev": {
"dateAdded": "2024-01-20",
"knownRansomware": false,
"notes": "Active exploitation observed"
},
"epss": {
"score": 0.97234,
"percentile": 0.99,
"date": "2024-01-25"
},
"acsc": [
{
"id": "2024-critical-vulnerability-alert",
"title": "Critical Vulnerability Alert",
"type": "alert",
"priority": "Critical",
"publishedDate": "2024-01-20T08:00:00Z"
}
],
"attack": {
"techniques": ["T1190", "T1059", "T1203"]
}
}
},
"meta": {
"timestamp": "2024-01-25T12:00:00Z",
"version": "v1",
"correlationId": "req-12345"
}
}

ATT&CK Technique Mapping Example:

When you include ATT&CK data (?include=attack), the response includes technique IDs that map to specific adversary behaviors:

{
"data": {
"cve": {
"id": "CVE-2021-44228",
"description": "Apache Log4j2 JNDI features do not protect against attacker controlled LDAP...",
"cvss": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL"
},
"kev": {
"dateAdded": "2021-12-10",
"knownRansomware": true
},
"attack": {
"techniques": ["T1190", "T1059", "T1203", "T1210"]
}
}
}
}

What the ATT&CK techniques mean:

  • T1190 (Exploit Public-Facing Application): Attackers exploit this vulnerability in internet-facing systems
  • T1059 (Command and Scripting Interpreter): Enables remote command execution
  • T1203 (Exploitation for Client Execution): Can be triggered through user interaction
  • T1210 (Exploitation of Remote Services): Allows lateral movement within networks

This intelligence helps prioritize patching based on how adversaries actually use the vulnerability.

Batch CVE Details (Enterprise)​

POST /api/v1/cve/batch

💰 Cost: 35 credits (flat rate for 1-50 CVEs - 86% savings vs individual calls)

Retrieve detailed information for multiple CVEs in a single request with enterprise-grade threat intelligence.

Headers:

  • X-API-Key: Required
  • Content-Type: application/json

Request Body:

{
"cve_ids": ["CVE-2024-0001", "CVE-2024-0002"],
"fields": ["cve_id", "severity", "kev", "epss"],
"include": "enrichment"
}

Parameters:

  • cve_ids (required): Array of CVE IDs (1-50 maximum)
  • fields (optional): Array of fields to include in response
  • include (optional): Enrichment data to include (enrichment, acsc, attack)

Example Request:

curl -X POST -H "X-API-Key: your-api-key-here" \
-H "Content-Type: application/json" \
-d '{"cve_ids": ["CVE-2021-44228", "CVE-2024-0001"]}' \
https://api.cybersecfeed.com/api/v1/cve/batch

Response:

{
"data": {
"cves": {
"CVE-2021-44228": {
"cve_id": "CVE-2021-44228",
"published": "2021-12-09T15:15:00Z",
"modified": "2024-01-20T10:30:00Z",
"severity": 10.0,
"description": "Apache Log4j2 JNDI features do not protect against attacker controlled LDAP...",
"status": "Analyzed",
"source_tag": "nvd",
"enrichment_status": "enriched",
"kev": {
"known_exploited": true,
"due_date": "2021-12-24",
"action_required": "Update Apache Log4j2 to version 2.17.1 or later"
},
"epss": {
"score": 0.97561,
"percentile": 0.99998,
"date": "2024-01-25"
}
}
},
"not_found": [],
"count": 1,
"total_requested": 1,
"credits_charged": 35,
"enriched_percentage": 100,
"timestamp": "2024-01-25T12:00:00Z"
}
}

Search and List CVEs​

GET /api/v1/cves

💰 Cost: 1 credit

Search, filter, and list CVEs with advanced v1.5 features (now enabled by default).

Headers:

  • X-API-Key: Required

Query Parameters:

  • q (optional): Full-text search query
  • ids (optional): Comma-separated list of CVE IDs for simple batch lookup (use POST /api/v1/cve/batch for enterprise features)
  • severity_min (optional): Minimum CVSS base score (0.0-10.0)
  • severity_max (optional): Maximum CVSS base score (0.0-10.0)
  • severity (optional): Named severity level (critical, high, medium, low)
  • exploit (optional): Filter for exploitable CVEs (true/false) - includes KEV and enrichment-based detection
  • published_after (optional): ISO 8601 date (e.g., 2024-01-01)
  • published_before (optional): ISO 8601 date
  • modified_after (optional): ISO 8601 date
  • modified_before (optional): ISO 8601 date
  • kev (optional): Filter by KEV status (true/false)
  • epss_min (optional): Minimum EPSS score (0.0-1.0)
  • epss_max (optional): Maximum EPSS score (0.0-1.0)
  • sort (optional): Sort results by severity_desc, severity_asc, published_desc, published_asc, modified_desc, modified_asc, epss_desc, epss_asc
  • limit (optional): Number of results per page (1-100, default: 20)
  • after (optional): Cursor for pagination
  • fields (optional): Comma-separated list of fields to include (enables up to 85% payload reduction)
  • include (optional): Comma-separated list of enrichment data to include (acsc, enrichment, attack)

Example Requests:

Search for recent critical vulnerabilities with sorting:

curl -H "X-API-Key: your-api-key-here" \
"https://api.cybersecfeed.com/api/v1/cves?severity=critical&published_after=2024-01-01&sort=severity_desc&limit=10"

Search exploitable CVEs with field selection (85% payload reduction):

curl -H "X-API-Key: your-api-key-here" \
"https://api.cybersecfeed.com/api/v1/cves?exploit=true&fields=cve_id,severity,kev,epss&limit=20"

Full-text search with EPSS sorting:

curl -H "X-API-Key: your-api-key-here" \
"https://api.cybersecfeed.com/api/v1/cves?q=buffer+overflow&sort=epss_desc&limit=20"

Simple batch lookup (for enterprise features, use POST /api/v1/cve/batch):

curl -H "X-API-Key: your-api-key-here" \
"https://api.cybersecfeed.com/api/v1/cves?ids=CVE-2024-0001,CVE-2024-0002,CVE-2024-0003"

Search with ACSC data included:

curl -H "X-API-Key: your-api-key-here" \
"https://api.cybersecfeed.com/api/v1/cves?q=buffer+overflow&include=acsc&limit=20"

Search with both ACSC and enrichment data:

curl -H "X-API-Key: your-api-key-here" \
"https://api.cybersecfeed.com/api/v1/cves?severity_min=7.0&include=acsc,enrichment&limit=10"

Efficient ACSC CVE discovery (recommended for ACSC-focused workflows):

# Get only CVEs with ACSC notices for efficient discovery
curl -H "X-API-Key: your-api-key-here" \
"https://api.cybersecfeed.com/api/v1/cves?has_acsc=true&include=acsc&limit=100"

# High-priority ACSC vulnerabilities
curl -H "X-API-Key: your-api-key-here" \
"https://api.cybersecfeed.com/api/v1/cves?has_acsc=true&severity=critical&include=acsc"

Search for high-risk CVEs with ATT&CK mappings:

# Critical CVEs with known attack techniques
curl -H "X-API-Key: your-api-key-here" \
"https://api.cybersecfeed.com/api/v1/cves?severity_min=9.0&include=attack&limit=20"

# Known exploited vulnerabilities with ATT&CK data for threat hunting
curl -H "X-API-Key: your-api-key-here" \
"https://api.cybersecfeed.com/api/v1/cves?kev=true&include=attack&limit=50"

Response:

{
"data": {
"cves": [
{
"id": "CVE-2024-0001",
"published": "2024-01-15T10:00:00Z",
"lastModified": "2024-01-16T14:30:00Z",
"description": "Buffer overflow vulnerability in Example Product...",
"cvss": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"enrichment": {
"cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"cvss_source": "nvd",
"cwe_list": ["CWE-120", "CWE-787"],
"exploit_flag": true,
"kev_flag": false,
"attack_vector": "network",
"patch_available": true,
"cpe_count": 15,
"reference_count": 23,
"vendor_tags": ["nvd"],
"enriched_at": "2024-01-15T18:30:00.000Z"
},
"acsc_notices": [
{
"id": "2024-advisory-001",
"type": "advisory",
"title": "Critical Buffer Overflow Vulnerabilities",
"priority": "Critical",
"published": "2024-01-16T08:00:00Z"
}
]
}
],
"pagination": {
"limit": 20,
"hasMore": true,
"nextCursor": "cursor-value"
}
},
"meta": {
"timestamp": "2024-01-25T12:00:00Z",
"version": "v1",
"correlationId": "req-12345"
}
}

Response with ATT&CK data included:

When using include=attack, the response includes ATT&CK technique mappings:

{
"data": {
"cves": [
{
"id": "CVE-2024-21234",
"published": "2024-01-15T10:00:00Z",
"description": "Remote code execution vulnerability...",
"cvss": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"kev": {
"dateAdded": "2024-01-20",
"knownRansomware": false
},
"attack": {
"techniques": ["T1190", "T1059.003"]
}
},
{
"id": "CVE-2024-21235",
"published": "2024-01-16T10:00:00Z",
"description": "Privilege escalation vulnerability...",
"cvss": {
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"attack": {
"techniques": ["T1068", "T1055"]
}
}
],
"pagination": {
"limit": 20,
"hasMore": true,
"nextCursor": "cursor-value"
}
}
}

The ATT&CK techniques help identify:

  • T1190: Internet-facing attack surface
  • T1059.003: Windows Command Shell execution
  • T1068: Privilege escalation to SYSTEM
  • T1055: Process injection capabilities

Recent CVEs​

GET /api/v1/cves/recent

💰 Cost: 2 credits

Retrieve recently published or modified CVEs for monitoring and alerting workflows.

Headers:

  • X-API-Key: Required

Query Parameters:

  • hours (optional): Look back period in hours (default: 24, max: 168)
  • days (optional): Look back period in days (alternative to hours, max: 7)
  • limit (optional): Number of results per page (1-100, default: 50)
  • after (optional): Cursor for pagination
  • fields (optional): Comma-separated list of fields to include
  • include (optional): Enrichment data to include (acsc, enrichment, attack)

Example Requests:

# CVEs from last 24 hours (default)
curl -H "X-API-Key: your-api-key-here" \
https://api.cybersecfeed.com/api/v1/cves/recent

# CVEs from last 48 hours with field selection
curl -H "X-API-Key: your-api-key-here" \
"https://api.cybersecfeed.com/api/v1/cves/recent?hours=48&fields=cve_id,severity,published"

# Last 7 days of critical CVEs with enrichment
curl -H "X-API-Key: your-api-key-here" \
"https://api.cybersecfeed.com/api/v1/cves/recent?days=7&severity=critical&include=enrichment"

Response:

{
"data": {
"cves": [
{
"cve_id": "CVE-2024-0001",
"published": "2024-01-25T10:00:00Z",
"modified": "2024-01-25T10:00:00Z",
"severity": 9.8,
"description": "Recently discovered critical vulnerability...",
"status": "Analyzed",
"source_tag": "nvd",
"enrichment_status": "pending"
}
],
"pagination": {
"limit": 50,
"hasMore": false
},
"lookback_period": "24 hours",
"total_found": 15
}
}

KEV Endpoint​

Get Known Exploited Vulnerabilities​

GET /api/v1/kev

💰 Cost: 1 credit

Retrieve the catalog of known exploited vulnerabilities.

Headers:

  • X-API-Key: Required

Query Parameters:

  • vendor (optional): Filter by vendor name
  • product (optional): Filter by product name
  • ransomware (optional): Filter by ransomware association (true/false)
  • limit (optional): Number of results per page (1-100, default: 20)
  • after (optional): Cursor for pagination

Example Request:

curl -H "X-API-Key: your-api-key-here" \
"https://api.cybersecfeed.com/api/v1/kev?ransomware=true&limit=10"

Response:

{
"data": {
"vulnerabilities": [
{
"cveId": "CVE-2023-12345",
"vendorProject": "Example Corp",
"product": "Example Product",
"vulnerabilityName": "Example Product Remote Code Execution",
"dateAdded": "2024-01-20",
"shortDescription": "A vulnerability allowing remote code execution...",
"requiredAction": "Apply patches immediately",
"dueDate": "2024-02-10",
"knownRansomware": true,
"notes": "Additional context..."
}
],
"pagination": {
"limit": 10,
"hasMore": true,
"nextCursor": "cursor-value"
}
},
"meta": {
"timestamp": "2024-01-25T12:00:00Z",
"version": "v1",
"correlationId": "req-12345"
}
}

CVE Detail Endpoint​

Get Detailed CVE Data​

GET /api/v1/cve/{cve-id}/detail

Retrieve comprehensive CVE data including CPE configurations, references, and vendor-specific enrichment from blob storage. This endpoint provides the most detailed information available for high-value CVEs.

Headers:

  • X-API-Key: Required

Path Parameters:

  • cve-id: CVE identifier (e.g., CVE-2024-0001)

Query Parameters:

  • vendor (optional): Vendor source for enrichment data. Options:
    • nvd (default): National Vulnerability Database
    • mitre: MITRE Corporation
    • cisco: Cisco Security (Enterprise plans)
    • flashpoint: Flashpoint Intelligence (Enterprise plans)

Example Requests:

# Get detailed NVD data (default)
curl -H "X-API-Key: your-api-key-here" \
https://api.cybersecfeed.com/api/v1/cve/CVE-2024-0001/detail

# Get vendor-specific enrichment
curl -H "X-API-Key: your-api-key-here" \
"https://api.cybersecfeed.com/api/v1/cve/CVE-2024-0001/detail?vendor=cisco"

Response (Full Detail):

{
"data": {
"cve_id": "CVE-2024-0001",
"vendor": "nvd",
"metrics": {
"cvss_v31": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"exploitabilityScore": 3.9,
"impactScore": 6.0
},
"severity": "CRITICAL",
"exploitability": {
"score": 3.9,
"evidence": ["Public exploit available", "Metasploit module exists"]
}
},
"technical_details": {
"cwe": [
{
"id": "CWE-787",
"name": "Out-of-bounds Write",
"description": "The software writes data past the end of the intended buffer"
}
],
"attack_vector": "NETWORK",
"attack_complexity": "LOW",
"authentication": "NONE"
},
"affected_products": {
"cpe_configurations": [
{
"vulnerable": true,
"cpe23Uri": "cpe:2.3:a:vendor:product:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.0.0",
"versionEndExcluding": "2.5.0"
}
],
"total_cpe_count": 15
},
"references": {
"vendor_advisories": [
{
"url": "https://vendor.com/security/advisory-123",
"tags": ["Vendor Advisory", "Patch"],
"source": "vendor"
}
],
"exploits": [
{
"url": "https://exploit-db.com/exploits/12345",
"tags": ["Exploit", "Third Party Advisory"]
}
],
"total_reference_count": 23
},
"enrichment_metadata": {
"created_at": "2024-01-15T18:30:00Z",
"vendor_tags": ["nvd"],
"data_completeness": "full"
}
},
"meta": {
"timestamp": "2024-01-25T12:00:00Z",
"version": "v1",
"correlationId": "req-12345"
}
}

Response (Partial - Enrichment Only):

When full blob data is unavailable, the endpoint returns available enrichment data:

{
"data": {
"status": "partial",
"message": "Full blob data unavailable; returning enrichment snapshot",
"data": {
"cve_id": "CVE-2024-0001",
"vendor": "nvd",
"enrichment": {
"cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"cvss_source": "nvd",
"cwe_list": ["CWE-787", "CWE-120"],
"exploit_flag": true,
"patch_available": true,
"cpe_count": 15,
"reference_count": 23,
"vendor_tags": ["nvd"],
"attack_vector": "network",
"kev_flag": false,
"attack_techniques": ["T1190", "T1059"],
"enriched_at": "2024-01-15T18:30:00Z"
}
}
},
"meta": {
"timestamp": "2024-01-25T12:00:00Z",
"version": "v1",
"correlationId": "req-12345"
}
}

Response Headers:

  • X-Blob-Status: Indicates blob availability (available, missing, partial)
  • Cache-Control: Standard caching headers for performance

When to Use This Endpoint:

  • Security Research: Deep dive into vulnerability mechanics
  • Patch Management: Identify all affected product versions
  • Threat Modeling: Understand exploitation requirements
  • Compliance Reporting: Document comprehensive vulnerability details
  • Vendor-Specific Intelligence: Access specialized threat data (Enterprise)

Data Availability:

Detailed blob data is available for:

  • CVEs with CVSS score ≥ 7.0 (HIGH/CRITICAL)
  • CVEs with known exploits
  • CVEs affecting multiple products (high CPE count)
  • CVEs with significant security impact

Note: Not all CVEs have detailed blob data. Use the standard /api/v1/cve/{id} endpoint for basic CVE information.

Usage Endpoint​

Get API Key Usage​

GET /api/v1/usage

💰 Cost: 0 credits (free monitoring)

Retrieve current usage statistics for your API key.

Headers:

  • X-API-Key: Required

Response:

{
"data": {
"usage": {
"plan": "CyberSecFeed Plus",
"credits_limit": 30000,
"credits_used": 1523,
"credits_remaining": 28477,
"reset_at": "2024-02-01T00:00:00Z",
"percentage_used": 5.08
}
},
"meta": {
"timestamp": "2024-01-25T12:00:00Z",
"version": "v1",
"correlationId": "req-12345"
}
}

Response Headers:

  • X-Rate-Limit-Remaining: Requests remaining in rate limit window (Free tier only)
  • X-Rate-Limit-Reset: Unix timestamp when rate limit resets (Free tier only)

Note: Credit information (used/limit) is not included in response headers to improve caching performance. To check your current usage and credit limits, use the dedicated /api/v1/usage endpoint.

Error Responses:

// 401 Unauthorized - Invalid or missing API key
{
"error": {
"code": "UNAUTHORIZED",
"message": "Invalid API key"
}
}

// 429 Too Many Requests - Credit limit exceeded
{
"error": {
"code": "CREDIT_LIMIT_EXCEEDED",
"message": "Monthly credit limit exceeded. Upgrade your plan or wait for reset.",
"details": {
"credits_used": 30000,
"credits_limit": 30000,
"reset_at": "2024-02-01T00:00:00Z"
}
}
}

Statistics Endpoint​

Get Platform Statistics​

GET /api/v1/stats

💰 Cost: 0.5 credits

Retrieve aggregate statistics about the vulnerability database.

Headers:

  • X-API-Key: Required

Response:

{
"data": {
"stats": {
"totalCves": 350000,
"cvesLast24Hours": 125,
"cvesLast7Days": 890,
"cvesLast30Days": 3456,
"totalKev": 1374,
"totalWithEpss": 284000,
"averageEpssScore": 0.123,
"totalWithAcsc": 245,
"lastUpdated": "2024-01-25T11:45:00Z"
}
},
"meta": {
"timestamp": "2024-01-25T12:00:00Z",
"version": "v1",
"correlationId": "req-12345"
}
}