KEVIntel Pro API
Free API
- Basic KEV data
- Delays on proprietary data
- No support
Pro API
- Complete KEV data
- CVSS score data
- Exploit status data
- Proof of Concepts (PoCs) data
- Scanner integrations data
- Mentions data
- Tag data, such as "wordpress", "drupal", etc.
- Immidiate proprietary data from custom Honeypots
- Helps fund more Honeypot sensors
- Priority support
Ready for Pro?
Contact us to get started with KEVIntel Pro API
Contact UsFree of charge for Ukrainian πΊπ¦ organisations
API Response Examples
For complete API documentation, including all endpoints and parameters:
View API DocumentationFree API Response
{
"cve_id": "CVE-2025-1976",
"title": "Code injection exposure in Fabric OS 9.1.0 through 9.1.1d6",
"vendor": "Brocade",
"product": "Fabric OS",
"added_date": "2025-04-28T00:00:00.000Z",
"source": "CISA"
}
Pro API Response
{
"kevs": [
{
"cve_id": "CVE-2024-1234",
"title": "Remote Code Execution in Example Software",
"description": "A critical vulnerability allowing remote code execution...",
"affected_vendor": "Example Vendor",
"affected_product": "Example Product",
"references": [
"https://example.com/ref1",
"https://example.com/ref2"
],
"state": "PUBLISHED",
"notes": "Additional information about the vulnerability",
"date_published": "2024-01-01T00:00:00Z",
"date_updated": "2024-01-02T00:00:00Z",
"date_reserved": "2024-01-01T00:00:00Z",
"added_date": "2024-01-01T00:00:00Z",
"epss_score": 0.95,
"epss_percentile": 0.98,
"epss_date": "2024-01-01T00:00:00Z",
"ssvc_exploitation": "ACTIVE",
"ssvc_automatable": "YES",
"ssvc_technical_impact": "TOTAL",
"cvss_v4_0": {
"version": "4.0",
"base_score": 9.8,
"base_severity": "CRITICAL",
"vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H"
},
"cvss_v3_1": {
"version": "3.1",
"base_score": 9.8,
"base_severity": "CRITICAL",
"vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
"cvss_v3_0": {
"version": "3.0",
"base_score": 9.8,
"base_severity": "CRITICAL",
"vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
"cvss_v2_0": {
"version": "2.0",
"base_score": 10,
"base_severity": "HIGH",
"vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
},
"source": {
"name": "CISA",
"url": "https://example.com/kev/1234"
},
"tags": [
{
"name": "wordpress",
"colour": "#FF5733",
"description": "WordPress-related vulnerability"
}
],
"exploit_status": {
"status": "EXPLOITED",
"date": "2024-01-01T00:00:00Z"
},
"proof_of_concepts": [
{
"title": "Example PoC",
"url": "https://example.com/poc",
"date": "2024-01-01T00:00:00Z"
}
],
"scanner_integrations": [
{
"scanner": "Nuclei",
"plugin_id": "12345",
"date": "2024-01-01T00:00:00Z"
}
],
"mentions": [
{
"source": "TheHackerNews",
"url": "https://thehackernews.com/2024/01/01/example-vulnerability-exploit.html",
"date": "2024-01-01T00:00:00Z"
}
]
}
],
"pagination": {
"current_page": 1,
"total_pages": 3,
"total_count": 30,
"per_page": 10,
"next_page": 2,
"prev_page": null,
"first_page": 1,
"last_page": 3
}
}