KEVIntel Pro API

Free API

  • Basic KEV data
  • Delays on proprietary data
  • No support

Pro API

  • Complete KEV data
  • CVSS score data
  • Exploit status data
  • Proof of Concepts (PoCs) data
  • Scanner integrations data
  • Mentions data
  • Tag data, such as "wordpress", "drupal", etc.
  • Immidiate proprietary data from custom Honeypots
  • Helps fund more Honeypot sensors
  • Priority support

Ready for Pro?

Contact us to get started with KEVIntel Pro API

Contact Us

Free of charge for Ukrainian πŸ‡ΊπŸ‡¦ organisations

API Response Examples

For complete API documentation, including all endpoints and parameters:

View API Documentation

Free API Response

    {
      "cve_id": "CVE-2025-1976",
      "title": "Code injection exposure in Fabric OS 9.1.0 through 9.1.1d6",
      "vendor": "Brocade",
      "product": "Fabric OS",
      "added_date": "2025-04-28T00:00:00.000Z",
      "source": "CISA"
    }

Pro API Response

{
  "kevs": [
    {
      "cve_id": "CVE-2024-1234",
      "title": "Remote Code Execution in Example Software",
      "description": "A critical vulnerability allowing remote code execution...",
      "affected_vendor": "Example Vendor",
      "affected_product": "Example Product",
      "references": [
        "https://example.com/ref1",
        "https://example.com/ref2"
      ],
      "state": "PUBLISHED",
      "notes": "Additional information about the vulnerability",
      "date_published": "2024-01-01T00:00:00Z",
      "date_updated": "2024-01-02T00:00:00Z",
      "date_reserved": "2024-01-01T00:00:00Z",
      "added_date": "2024-01-01T00:00:00Z",
      "epss_score": 0.95,
      "epss_percentile": 0.98,
      "epss_date": "2024-01-01T00:00:00Z",
      "ssvc_exploitation": "ACTIVE",
      "ssvc_automatable": "YES",
      "ssvc_technical_impact": "TOTAL",
      "cvss_v4_0": {
        "version": "4.0",
        "base_score": 9.8,
        "base_severity": "CRITICAL",
        "vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H"
      },
      "cvss_v3_1": {
        "version": "3.1",
        "base_score": 9.8,
        "base_severity": "CRITICAL",
        "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
      },
      "cvss_v3_0": {
        "version": "3.0",
        "base_score": 9.8,
        "base_severity": "CRITICAL",
        "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
      },
      "cvss_v2_0": {
        "version": "2.0",
        "base_score": 10,
        "base_severity": "HIGH",
        "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
      },
      "source": {
        "name": "CISA",
        "url": "https://example.com/kev/1234"
      },
      "tags": [
        {
          "name": "wordpress",
          "colour": "#FF5733",
          "description": "WordPress-related vulnerability"
        }
      ],
      "exploit_status": {
        "status": "EXPLOITED",
        "date": "2024-01-01T00:00:00Z"
      },
      "proof_of_concepts": [
        {
          "title": "Example PoC",
          "url": "https://example.com/poc",
          "date": "2024-01-01T00:00:00Z"
        }
      ],
      "scanner_integrations": [
        {
          "scanner": "Nuclei",
          "plugin_id": "12345",
          "date": "2024-01-01T00:00:00Z"
        }
      ],
      "mentions": [
        {
          "source": "TheHackerNews",
          "url": "https://thehackernews.com/2024/01/01/example-vulnerability-exploit.html",
          "date": "2024-01-01T00:00:00Z"
        }
      ]
    }
  ],
  "pagination": {
    "current_page": 1,
    "total_pages": 3,
    "total_count": 30,
    "per_page": 10,
    "next_page": 2,
    "prev_page": null,
    "first_page": 1,
    "last_page": 3
  }
}