NIST NVD CVE Vulnerability Database Scraper
Pricing
from $2.00 / 1,000 results
NIST NVD CVE Vulnerability Database Scraper
Search and extract CVE vulnerability data from the NIST National Vulnerability Database (NVD) API 2.0. Filter by keyword, CVSS severity, publication date, and modification date. Returns flattened CVE records with CVSS scores, CWE IDs, references, and affected products.
Pricing
from $2.00 / 1,000 results
Rating
0.0
(0)
Developer
Compute Edge
Actor stats
0
Bookmarked
2
Total users
1
Monthly active users
4 days ago
Last modified
Categories
Share
Extract CVE vulnerability data from the NIST National Vulnerability Database (NVD) via the official NVD API 2.0. Search and filter CVEs by keyword, CVSS severity, publication date, and modification date. Returns flattened CVE records with CVSS scores, severity ratings, CWE IDs, references, and affected products (CPE).
The NVD is the U.S. government's authoritative repository of vulnerability data, containing over 250,000 CVEs. Security teams, vulnerability management platforms, and threat intelligence analysts rely on NVD data for prioritizing remediation, compliance reporting, and risk assessment. This Actor delivers clean, structured JSON output ready for SIEM ingestion, ticketing systems, or RAG pipelines.
Key Features
| Feature | Description |
|---|---|
| 250,000+ CVEs | Access the full NVD database of published vulnerabilities |
| Keyword search | Search CVE descriptions for terms like "buffer overflow", "SQL injection" |
| CVSS severity filter | Filter by Low, Medium, High, or Critical severity |
| Date range filtering | Filter by publication or modification date (120-day windows) |
| CVSS v3.1/v3.0/v2 support | Automatically extracts best available CVSS metrics |
| CWE extraction | Weakness classification IDs for each CVE |
| Automatic pagination | Handles NVD API pagination transparently |
| Rate limit handling | Built-in delays and retry logic for NVD API limits |
How to Scrape NIST NVD Vulnerability Data
- Go to this Actor's page on the Apify Store
- Click "Start" to open the input configuration form
- Set your filters:
- Enter a Keyword to search CVE descriptions (e.g.,
remote code execution) - Select a CVSS Severity level (Low, Medium, High, Critical)
- Set Published After/Before dates to filter by publication date
- Set Modified After/Before dates to filter by modification date
- Set Max Results (default: 1000, max: 50,000)
- Enter a Keyword to search CVE descriptions (e.g.,
- Click "Start" to run the Actor
- Download your data in JSON, CSV, or Excel from the Dataset tab
Input Example
{"keywordSearch": "remote code execution","severity": "CRITICAL","publishedAfter": "2025-01-01","publishedBefore": "2025-03-30","maxResults": 500}
Output Example
{"cveId": "CVE-2025-12345","description": "A remote code execution vulnerability in ExampleProduct allows...","cvssScore": 9.8,"cvssSeverity": "CRITICAL","cvssVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","cweIds": ["CWE-94"],"publishedDate": "2025-02-15T17:15:00.000","lastModifiedDate": "2025-02-20T12:30:00.000","references": ["https://example.com/advisory/2025-001"],"affectedProducts": ["cpe:2.3:a:example:product:1.0:*:*:*:*:*:*:*"]}
Pricing
This Actor uses pay-per-result pricing:
| Event | Price |
|---|---|
| Actor Start | $0.00005 |
| Per result | $0.002 |
A typical run of 500 CVE records costs approximately $1.00 in Actor fees plus minimal Apify compute costs. Note: NVD API rate limits (6 seconds between requests without an API key) mean large queries may take several minutes.
Use Cases
- Vulnerability management — Feed CVE data into ticketing systems to track remediation
- Threat intelligence — Enrich threat feeds with CVSS scores, CWE types, and affected products
- Compliance reporting — Generate reports of critical/high-severity CVEs for audit purposes
- Security research — Analyze vulnerability trends by severity, weakness type, or product
- SOC dashboards — Integrate with Splunk, Elastic, or Sentinel for CVE monitoring
- RAG/LLM pipelines — Structured vulnerability data ready for AI-powered security analysis
FAQ
Is it legal to scrape the NIST NVD?
Yes. This Actor uses the official NVD API 2.0, which is a free public government data service. The data is in the public domain and freely available for any use. No authentication is required (though an API key increases rate limits).
How Much Does It Cost to Scrape NIST NVD Data?
See the pricing table above. At $0.002 per result, fetching 1,000 CVEs costs approximately $2.00 in Actor fees plus minimal Apify compute costs.
Can I export NVD data to Excel or CSV?
Yes. Apify supports exporting results in JSON, CSV, Excel, XML, and other formats directly from the Dataset tab after a run completes.
How often is the NVD updated?
NIST updates the NVD continuously as new CVEs are published and existing CVEs are analyzed. New CVEs typically appear within hours of being assigned. You can schedule this Actor to run at any interval.
Why is there a 120-day limit on date ranges?
The NVD API 2.0 restricts date range queries to 120 days maximum. For longer periods, run the Actor multiple times with consecutive date ranges.
Other Scrapers by SeatSignal
- CISA KEV Scraper — Extract actively exploited vulnerabilities from the CISA KEV catalog
- CPSC Product Recalls Scraper — Extract consumer product recall data
- NHTSA Vehicle Safety Scraper — Extract vehicle recalls and safety data
- OSHA Inspections Scraper — Extract OSHA workplace inspection data
- FDA OpenFDA Scraper — Extract FDA drug and device safety data
Legal Disclaimer
This Actor accesses publicly available data from the NIST National Vulnerability Database via the official NVD API 2.0. The data is provided by a U.S. government agency and is in the public domain. This Actor does not bypass any authentication or access controls. Users are responsible for ensuring their use of the data complies with applicable laws and regulations.
For questions or support, please open an issue on this Actor's page.