NIST NVD CVE Vulnerability Database Scraper avatar

NIST NVD CVE Vulnerability Database Scraper

Pricing

from $2.00 / 1,000 results

Go to Apify Store
NIST NVD CVE Vulnerability Database Scraper

NIST NVD CVE Vulnerability Database Scraper

Search and extract CVE vulnerability data from the NIST National Vulnerability Database (NVD) API 2.0. Filter by keyword, CVSS severity, publication date, and modification date. Returns flattened CVE records with CVSS scores, CWE IDs, references, and affected products.

Pricing

from $2.00 / 1,000 results

Rating

0.0

(0)

Developer

Compute Edge

Compute Edge

Maintained by Community

Actor stats

0

Bookmarked

2

Total users

1

Monthly active users

4 days ago

Last modified

Share

Extract CVE vulnerability data from the NIST National Vulnerability Database (NVD) via the official NVD API 2.0. Search and filter CVEs by keyword, CVSS severity, publication date, and modification date. Returns flattened CVE records with CVSS scores, severity ratings, CWE IDs, references, and affected products (CPE).

The NVD is the U.S. government's authoritative repository of vulnerability data, containing over 250,000 CVEs. Security teams, vulnerability management platforms, and threat intelligence analysts rely on NVD data for prioritizing remediation, compliance reporting, and risk assessment. This Actor delivers clean, structured JSON output ready for SIEM ingestion, ticketing systems, or RAG pipelines.

Key Features

FeatureDescription
250,000+ CVEsAccess the full NVD database of published vulnerabilities
Keyword searchSearch CVE descriptions for terms like "buffer overflow", "SQL injection"
CVSS severity filterFilter by Low, Medium, High, or Critical severity
Date range filteringFilter by publication or modification date (120-day windows)
CVSS v3.1/v3.0/v2 supportAutomatically extracts best available CVSS metrics
CWE extractionWeakness classification IDs for each CVE
Automatic paginationHandles NVD API pagination transparently
Rate limit handlingBuilt-in delays and retry logic for NVD API limits

How to Scrape NIST NVD Vulnerability Data

  1. Go to this Actor's page on the Apify Store
  2. Click "Start" to open the input configuration form
  3. Set your filters:
    • Enter a Keyword to search CVE descriptions (e.g., remote code execution)
    • Select a CVSS Severity level (Low, Medium, High, Critical)
    • Set Published After/Before dates to filter by publication date
    • Set Modified After/Before dates to filter by modification date
    • Set Max Results (default: 1000, max: 50,000)
  4. Click "Start" to run the Actor
  5. Download your data in JSON, CSV, or Excel from the Dataset tab

Input Example

{
"keywordSearch": "remote code execution",
"severity": "CRITICAL",
"publishedAfter": "2025-01-01",
"publishedBefore": "2025-03-30",
"maxResults": 500
}

Output Example

{
"cveId": "CVE-2025-12345",
"description": "A remote code execution vulnerability in ExampleProduct allows...",
"cvssScore": 9.8,
"cvssSeverity": "CRITICAL",
"cvssVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"cweIds": ["CWE-94"],
"publishedDate": "2025-02-15T17:15:00.000",
"lastModifiedDate": "2025-02-20T12:30:00.000",
"references": ["https://example.com/advisory/2025-001"],
"affectedProducts": ["cpe:2.3:a:example:product:1.0:*:*:*:*:*:*:*"]
}

Pricing

This Actor uses pay-per-result pricing:

EventPrice
Actor Start$0.00005
Per result$0.002

A typical run of 500 CVE records costs approximately $1.00 in Actor fees plus minimal Apify compute costs. Note: NVD API rate limits (6 seconds between requests without an API key) mean large queries may take several minutes.

Use Cases

  • Vulnerability management — Feed CVE data into ticketing systems to track remediation
  • Threat intelligence — Enrich threat feeds with CVSS scores, CWE types, and affected products
  • Compliance reporting — Generate reports of critical/high-severity CVEs for audit purposes
  • Security research — Analyze vulnerability trends by severity, weakness type, or product
  • SOC dashboards — Integrate with Splunk, Elastic, or Sentinel for CVE monitoring
  • RAG/LLM pipelines — Structured vulnerability data ready for AI-powered security analysis

FAQ

Yes. This Actor uses the official NVD API 2.0, which is a free public government data service. The data is in the public domain and freely available for any use. No authentication is required (though an API key increases rate limits).

How Much Does It Cost to Scrape NIST NVD Data?

See the pricing table above. At $0.002 per result, fetching 1,000 CVEs costs approximately $2.00 in Actor fees plus minimal Apify compute costs.

Can I export NVD data to Excel or CSV?

Yes. Apify supports exporting results in JSON, CSV, Excel, XML, and other formats directly from the Dataset tab after a run completes.

How often is the NVD updated?

NIST updates the NVD continuously as new CVEs are published and existing CVEs are analyzed. New CVEs typically appear within hours of being assigned. You can schedule this Actor to run at any interval.

Why is there a 120-day limit on date ranges?

The NVD API 2.0 restricts date range queries to 120 days maximum. For longer periods, run the Actor multiple times with consecutive date ranges.

Other Scrapers by SeatSignal

This Actor accesses publicly available data from the NIST National Vulnerability Database via the official NVD API 2.0. The data is provided by a U.S. government agency and is in the public domain. This Actor does not bypass any authentication or access controls. Users are responsible for ensuring their use of the data complies with applicable laws and regulations.

For questions or support, please open an issue on this Actor's page.