Find CVEs.
Faster.

A fast, reliable CVE lookup API enriched with real threat intelligence data — exploits, MITRE ATT&CK IDs, and OTX pulse counts included in every response.

3 Query Types
OTX Threat Intel
Free Beta Access

See it in action

Query any CVE ID and get back structured data enriched with threat intelligence — MITRE ATT&CK IDs, known exploits, CVSS scores, and seen-in-wild status.

bash
$ |

Everything you need for CVE intelligence

Built for security engineers, pentesters, and threat intel teams who need CVE data they can actually act on.

Keyword Search

Search CVEs by product, vendor, or technology — Microsoft, Cisco, Zoom, GCP, and more.

Threat Intelligence

Every CVE response includes OTX pulse counts, known exploits, and MITRE ATT&CK technique IDs.

Year Filtering

Narrow results by year of disclosure. Combine with a keyword for precise, targeted queries.

Company CVE Monitoring

Monitor your brand and products for associated CVEs. Useful for vendor risk and attack surface tracking.

Fresh Data

No stale caches. Every request pulls the latest CVE and threat intelligence data available.

Simple REST API

One endpoint, one header, one query param. Integrate in minutes from any language or tool.

Up and running in minutes

Add the X-Api-Key header and you're done. Works with any HTTP client.

curl \
  --header 'X-Api-Key: YOUR_API_KEY' \
  --location \
  --request GET \
  'https://api.cvesearch.com/search?q=CVE-2019-0708'
import requests

url = "https://api.cvesearch.com/search?q=CVE-2019-0708"
headers = {
    "X-Api-Key": "YOUR_API_KEY"
}

response = requests.get(url, headers=headers)
print(response.json())
const response = await fetch(
  "https://api.cvesearch.com/search?q=CVE-2019-0708",
  {
    headers: { "X-Api-Key": "YOUR_API_KEY" }
  }
);
const data = await response.json();
console.log(data);
package main

import (
    "fmt"
    "io"
    "net/http"
)

func main() {
    req, _ := http.NewRequest(
        "GET",
        "https://api.cvesearch.com/search?q=CVE-2019-0708",
        nil,
    )
    req.Header.Add("X-Api-Key", "YOUR_API_KEY")

    client := &http.Client{}
    resp, _ := client.Do(req)
    defer resp.Body.Close()

    body, _ := io.ReadAll(resp.Body)
    fmt.Println(string(body))
}

API Reference

Query Type Example Notes
CVE ID ?q=CVE-2019-0708 Exact CVE identifier lookup
Keyword ?q=microsoft Product, vendor, or technology name
Keyword + Year ?q=cisco&year=2023 Scope results to a specific year
GET https://api.cvesearch.com/search Auth: X-Api-Key: YOUR_API_KEY

Ready to start?

CVE Search is free during beta. Email us to get your personal API key and start querying in minutes.

Request an API Key

Or use the demo key in our documentation to try it right now.

Support this service