NIST NVD CVE Scraper
Pricing
from $22.50 / 1,000 results
NIST NVD CVE Scraper
Scrape CVE vulnerabilities from the NIST National Vulnerability Database (NVD) API 2.0. Filter by severity, CWE, keyword, date range, or single CVE ID. Returns CVSS v3/v2 scores, CWE weaknesses, CPE configurations, and references.
Pricing
from $22.50 / 1,000 results
Rating
0.0
(0)
Developer
ParseForge
Maintained by CommunityActor stats
0
Bookmarked
2
Total users
1
Monthly active users
a day ago
Last modified
Categories
Share

๐ก๏ธ NIST NVD CVE Scraper
๐ Export the global CVE catalogue in seconds. Pull 240,000+ CVE records from the official NIST National Vulnerability Database with CVSS v4, v3.1, and v2 scores, CWE weaknesses, CPE configurations, and full reference lists. No sign-up, no rate-limit headaches, no parser engineering.
๐ Last updated: 2026-05-15 ยท ๐ 21 fields per record ยท ๐ก๏ธ 240,000+ CVEs ยท ๐ฏ 4 scoring systems ยท ๐ 800+ CWE weakness types
The NIST NVD CVE Scraper pulls vulnerabilities from the official NIST National Vulnerability Database (NVD) and returns 21 normalised fields per record, including CVSS v4 / v3 / v2 base scores, weakness classifications, CPE 2.3 configurations, and curated reference links. The underlying catalogue is the canonical source of truth for U.S. federal vulnerability tracking and is consumed by every major SIEM, vulnerability scanner, and cloud security platform on the planet.
The catalogue covers every published CVE since 1999, four CVSS scoring systems, hundreds of CWE weakness families, and millions of CPE product mappings spanning operating systems, applications, libraries, and firmware. This Actor makes that data downloadable as CSV, Excel, JSON, or XML in minutes. Filters apply at the source, so you skip pagination, rate-limit handling, and field normalisation entirely.
| ๐ฏ Target Audience | ๐ก Primary Use Cases |
|---|---|
| Security teams, vulnerability managers, threat researchers, SOC analysts, DevSecOps engineers, compliance officers, security tool builders | CVE feed enrichment, patch prioritisation, SIEM integration, CVSS-based reporting, CPE matching, supply-chain risk, security dashboard automation |
๐ What the NIST NVD CVE Scraper does
Five workflows in a single Actor:
- ๐ Single CVE lookup. Fetch one record by its identifier, e.g.
CVE-2021-44228. - ๐ฆ Batch CVE lookup. Pass an array of IDs and get every match in one run.
- ๐ Keyword search. Free-text search across CVE descriptions for terms like
openssl,log4j, orremote code execution. - ๐๏ธ Severity + CWE filters. Restrict to Critical / High / Medium / Low or to a specific weakness type.
- ๐ Date-window crawl. Pull every CVE published inside a 120-day window for incremental syncs.
Each record includes the CVE identifier, source CNA, publication and modification timestamps, English description, all available CVSS scores, weakness list, affected configurations (CPE 2.3 with version ranges), and curated references with tags.
๐ก Why it matters: the NVD is the foundation of every vulnerability scanner, patch-management workflow, and security advisory pipeline. Building your own ingestion means handling pagination, the 120-day window cap, retry-after headers, and CVSS v2/v3/v4 normalisation by hand. This Actor skips all of that and gives you a clean, downloadable dataset.
๐ฌ Full Demo
๐ง Coming soon: a 3-minute walkthrough showing how to go from sign-up to a downloaded CVE dataset.
โ๏ธ Input
| Input | Type | Default | Behavior |
|---|---|---|---|
cveId | string | "" | Single CVE ID (e.g. CVE-2024-1234). Overrides all other filters. |
cveIds | string[] | [] | Batch list of CVE IDs (recommended max ~100 per run). |
keyword | string | "" | Free-text search across CVE descriptions. |
severity | enum | "" | One of CRITICAL / HIGH / MEDIUM / LOW. Empty for all. |
cweId | string | "" | Filter by CWE weakness ID (e.g. CWE-79). |
pubStartDate, pubEndDate | ISO 8601 | "" | Publish-date window. Both required together. Max 120-day span. |
hasKev | boolean | false | Restrict to CVEs in the CISA Known Exploited Vulnerabilities catalog. |
hasOval, hasCertAlerts, hasCertNotes | boolean | false | Restrict to records with OVAL / US-CERT alerts / US-CERT notes. |
noRejected | boolean | false | Skip CVEs in REJECTED status. |
sourceIdentifier | string | "" | Filter by submitting CNA (e.g. cve@mitre.org). |
virtualMatchString | string | "" | CPE 2.3 match string (e.g. cpe:2.3:a:apache:log4j). |
maxItems | integer | 10 | Records to return. Free plan caps at 10, paid plan at 1,000,000. |
Example: every Critical CVE published in Q1 2024.
{"maxItems": 500,"severity": "CRITICAL","pubStartDate": "2024-01-01T00:00:00.000","pubEndDate": "2024-03-31T23:59:59.999"}
Example: batch lookup of the Log4Shell family.
{"cveIds": ["CVE-2021-44228", "CVE-2021-45046", "CVE-2021-45105", "CVE-2021-44832"]}
โ ๏ธ Good to Know: the official NIST NVD source enforces a 120-day publish-date window per query. The Actor respects this limit and warns when only one of
pubStartDate/pubEndDateis supplied. For longer date ranges, run the Actor on a schedule with rolling windows.
๐ Output
Each record contains 21 fields. Download the dataset as CSV, Excel, JSON, or XML.
๐งพ Schema
| Field | Type | Example |
|---|---|---|
๐ cveId | string | "CVE-2021-44228" |
๐ url | string | "https://nvd.nist.gov/vuln/detail/CVE-2021-44228" |
๐ข sourceIdentifier | string | null | "security-advisories@github.com" |
๐
published | ISO 8601 | null | "2021-12-10T10:15:09.143" |
๐ lastModified | ISO 8601 | null | "2025-04-03T01:03:51.193" |
๐ฆ vulnStatus | string | null | "Modified" |
๐ description | string | null | "Apache Log4j2 2.0-beta9 through 2.15.0..." |
๐ฏ cvssV4BaseScore | number | null | null |
๐ฏ cvssV4Severity | string | null | null |
๐ฏ cvssV4VectorString | string | null | null |
๐ฏ cvssV3BaseScore | number | null | 10.0 |
๐ฏ cvssV3BaseSeverity | string | null | "CRITICAL" |
๐ฏ cvssV3VectorString | string | null | "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" |
๐ฏ cvssV2BaseScore | number | null | 9.3 |
๐ฏ cvssV2BaseSeverity | string | null | "HIGH" |
๐ฏ cvssV2VectorString | string | null | "AV:N/AC:M/Au:N/C:C/I:C/A:C" |
๐งฌ weaknesses | string[] | ["CWE-20", "CWE-400", "CWE-502"] |
๐งฑ configurations | object[] | [{ "operator": "OR", "cpeMatches": [...] }] |
๐ references | object[] | [{ "url": "https://logging.apache.org/...", "tags": ["Vendor Advisory"] }] |
๐ scrapedAt | ISO 8601 | "2026-05-15T00:00:00.000Z" |
โ error | string | null | null |
๐ฆ Sample record
โจ Why choose this Actor
| Capability | |
|---|---|
| ๐ก๏ธ | Authoritative source. Pulls directly from the official NIST National Vulnerability Database, the canonical CVE catalogue. |
| ๐ฏ | Multi-version CVSS. v4, v3.1, v3.0, and v2 base scores plus vector strings, all normalised in one record. |
| ๐งฑ | CPE 2.3 configurations. Affected product matches with version ranges, ready to join with asset inventories. |
| ๐งฌ | CWE weakness mapping. Each CVE comes with its full list of associated weakness types. |
| ๐ | Curated references. Vendor advisories, exploit links, US-CERT notes, and third-party analysis tagged at the source. |
| ๐ | Always fresh. Every run hits the live catalogue, so the dataset reflects current scoring and modification dates. |
| ๐ซ | No sign-up. Works with public vulnerability data. No login or token needed. |
๐ The NVD is consumed by every major SIEM, EDR, vulnerability scanner, and cloud security platform on the planet. Owning a clean local copy is a multiplier for every downstream security workflow.
๐ How it compares to alternatives
| Approach | Cost | Coverage | Refresh | Filters | Setup |
|---|---|---|---|---|---|
| โญ NIST NVD CVE Scraper (this Actor) | $5 free credit, then pay-per-use | 240,000+ CVEs | Live per run | severity, CWE, CPE, date, KEV, source | โก 2 min |
| Commercial threat-intel feeds | $10,000+/year | Curated subset | Streaming | Many | โณ Days |
| Manual exports | Free | Full | Stale | None | ๐ข Hours |
| Self-built ingestion | Engineering time | Full | Custom | Custom | ๐ ๏ธ Weeks |
Pick this Actor when you want the canonical CVE catalogue without writing pagination, retry, or normalisation code.
๐ How to use
- ๐ Sign up. Create a free account with $5 credit (takes 2 minutes).
- ๐ Open the Actor. Go to the NIST NVD CVE Scraper page on the Apify Store.
- ๐ฏ Set input. Pick a severity, keyword, CVE ID, or date window, then set
maxItems. - ๐ Run it. Click Start and let the Actor collect your data.
- ๐ฅ Download. Grab your results in the Dataset tab as CSV, Excel, JSON, or XML.
โฑ๏ธ Total time from signup to downloaded dataset: 3-5 minutes. No coding required.
๐ผ Business use cases
๐ Automating NIST NVD CVE Scraper
Control the scraper programmatically for scheduled runs and pipeline integrations:
- ๐ข Node.js. Install the
apify-clientNPM package. - ๐ Python. Use the
apify-clientPyPI package. - ๐ See the Apify documentation for full details.
The Apify Schedules feature lets you trigger this Actor on any cron interval. Hourly, daily, or weekly refreshes keep your downstream vulnerability database in sync automatically.
๐ Beyond business use cases
Data like this powers more than commercial workflows. The same structured records support research, education, civic projects, and personal initiatives.
๐ค Ask an AI assistant about this scraper
Open a ready-to-send prompt about this ParseForge actor in the AI of your choice:
- ๐ฌ ChatGPT
- ๐ง Claude
- ๐ Perplexity
- ๐ Copilot
โ Frequently Asked Questions
๐งฉ How does it work?
Configure your filters in the input form, click Start, and the Actor pulls matching CVEs from the official NIST NVD source, normalises CVSS v4 / v3 / v2 scoring, and emits one clean record per vulnerability.
๐ How accurate is the data?
The records are mirror-copies of the official NIST NVD catalogue at run time. Description text, CVSS scores, CWE mappings, and CPE configurations are taken verbatim from the source.
๐ How often is the dataset refreshed?
The official NIST source updates continuously as CNAs publish new CVEs and analysts revise existing ones. Every run of this Actor reflects the catalogue as of run time.
๐ฏ Which CVSS versions are included?
All four. The Actor surfaces CVSS v4.0, v3.1, v3.0, and v2 base scores plus vector strings whenever the source provides them. Older CVEs may carry only v2; newer ones may have v3 and v4.
๐ Why does the date filter cap at 120 days?
The official source enforces this window per query. To pull longer ranges, schedule the Actor with rolling 120-day windows or fetch by CVE ID list instead.
๐งฌ What is a CWE?
CWE (Common Weakness Enumeration) is the standard taxonomy of software weaknesses. Each CVE is mapped to one or more CWE IDs that classify the underlying flaw type, like buffer overflow or cross-site scripting.
๐งฑ What is a CPE?
CPE (Common Platform Enumeration) 2.3 is the standard product naming scheme. The Actor returns full CPE match strings with version ranges, ready to join against asset inventories or software bills of materials.
โฐ Can I schedule regular runs?
Yes. Use Apify Schedules to run this Actor on any cron interval. A common pattern is a 60-minute schedule that pulls the latest published CVEs and pushes them into a SIEM or ticketing system.
โ๏ธ Is this data legal to use?
The NIST NVD is a U.S. government public dataset with no restrictions on use, including commercial use. You should still review the official terms for your specific application.
๐ณ Do I need a paid Apify plan to use this Actor?
No. The free Apify plan is enough for testing and small runs (10 records per run). A paid plan lifts the limit and gives you scheduling, higher concurrency, and larger datasets.
๐ What if I need help?
Our support team is here to help. Contact us through the Apify platform or use the Tally form linked below.
๐ Integrate with any app
NIST NVD CVE Scraper connects to any cloud service via Apify integrations:
- Make - Automate multi-step workflows
- Zapier - Connect with 5,000+ apps
- Slack - Get CVE alerts in your security channels
- Airbyte - Pipe CVE data into your warehouse
- GitHub - Trigger runs from commits and releases
- Google Drive - Export datasets straight to Sheets
You can also use webhooks to trigger downstream actions when a run finishes. Push fresh CVE data into your ticketing system, or alert your team in Slack when a new Critical hits the catalogue.
๐ Recommended Actors
- ๐จ CISA KEV Scraper - Known Exploited Vulnerabilities catalogue with due dates
- ๐ EPSS Exploit Prediction Scraper - 30-day exploitation probability scores
- ๐ GitHub Security Advisories Scraper - GHSA + CVE advisories with patched versions
- ๐ฆ OSV Vulnerabilities Scraper - Open source vulnerabilities across PyPI, npm, Go, Maven and more
- ๐ฌ CIRCL CVE Scraper - CIRCL Luxembourg CVE catalogue with CWE and CAPEC
๐ก Pro Tip: browse the complete ParseForge collection for more security and reference-data scrapers.
๐ Need Help? Open our contact form to request a new scraper, propose a custom data project, or report an issue.
โ ๏ธ Disclaimer: this Actor is an independent tool and is not affiliated with, endorsed by, or sponsored by NIST, the U.S. government, or any of the CNAs that contribute to the NVD catalogue. All trademarks mentioned are the property of their respective owners. Only publicly available vulnerability data is collected.