Initiates the creation of the file with data about CVEs that matched the search query. When the file is created, it will be available for download. On the successful call, returns the unique identifier that represents the file creation process. The file creation is an asynchronous process because the amount of data that should be exported to the file and the export duration is hard to predict. The call to this endpoint just initiates the file creation. To check the file status and get the download link, send a GET request to the /v4/data/account/downloads/ API endpoint with the identifier returned by this endpoint. The number of rows available for download is determined by the subscription plan.

Log in to see full request history

Options for search params:

Search parameter Operator Value
id
eq
CVE ID defined by the MITRE Corporation.
string
cpe
eq
,
starts
Common Platform Enumeration (CPE) name or prefix. Example: cpe:2.3:o:canonical:ubuntu_linux:12.04.
string
score_cvss2
gte
,
lte
CVE score according to the Common Vulnerability Scoring System Version 2 (CVSS2).
string
score_cvss3
gte
,
lte
CVE score according to the Common Vulnerability Scoring System Version 3 (CVSS3).
string
severity_cvss2
eq
CVE severity according to CVSSv2. Supported options:
high
,
medium
,
low
.
string
severity_cvss3
eq
CVE severity according to CVSSv3. Supported options:
high
,
medium
,
low
,
critical
.
string
published_at
gte
,
lte
Vulnerability publication date. Format:
YYYY-MM-DD
.
string
modified_at
gte
,
lte
Vulnerability modification date. Format:
YYYY-MM-DD
.
string
Body Params
column_list
array of strings
required

List of columns to download. Supported values: id, base_score, severity, vector, description

column_list*
string
length ≤ 254

An optional field with a short file description. Max length: 254 characters.

string
required

The file format to use for the file creation. Supported values: ndjson, csv.

int64
≥ 1

The number of rows the user wants to receive in the current download request.

search_params
array of objects
required

A list of CVE attributes to filter the search results by. A comprehensive list of valid search parameters is shown in the table below.

search_params*
Responses

Language
Credentials
Click Try It! to start a request and see the response here! Or choose an example:
application/json