U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

NVD Data Feeds

APIs and Data Feed Types

The following table contains links and short descriptions for each API or data feed the NVD offers. Please read how to keep up-to-date with NVD data when using the traditional data feeds.

Users of the data feeds provided on this page must have an understanding of the XML and/or JSON standards and XML or JSON related technologies as defined by www.w3.org.

Type Description
CVE and CPE APIs An alternative to the traditional vulnerability data feed files. The APIs are far more flexible and offer a richer dataset in a single interface compared to the JSON Vulnerability Feeds and CPE Match Feed.
2.0 JSON Feeds A series of traditional data feed files that reflect the schema format of the 2.0 APIs.
  • Vulnerability Feeds (/cves/)
  • CPE Dictionary Feeds (/cpes/)
  • CPE Match Feeds (/cpematch/)
Vulnerability Translation Feeds Translations of vulnerability feeds.
Vulnerability Vendor Comments Comments provided by vendors regarding a particular flaw affecting within a product.
Common Configuration Enumeration (CCE) Reference Data Reference data for common configuration items.

CVE and CPE APIs

The 2.0 APIs are the preferred method for staying up to date with the NVD. Users interested in learning where to begin with the API should visit the NVD developers pages.

Benefits of the APIs over the traditional data feeds include:

  • The APIs are updated as frequently as our website (unlike the traditional feeds which have explicit update intervals)
  • The APIs provide search capabilities based on the Advanced search feature of the website
  • The APIs provide CVE and CPE based searching capabilities, including the ability to search for single CVE and CPE entries
  • The ability to view only the information that has changed since a given date or time
  • Simplified methods of identifying CPE matches to Applicability statements
CVE API Documentation CPE API Documentation
Automation Support for CVE Retrieval  Automation Support for CPE Retrieval

How to Keep Up-to-Date with the NVD Data Using the Traditional Feeds

The vulnerability feeds provide CVE® data organized by the first four digits of a CVE® identifier (except for the 2002 feeds which include vulnerabilities prior to and including "CVE-2002-"). If you are locally mirroring NVD data, either the APIs or the data feeds may be used to stay synchronized. After performing a one-time import of the complete data set using the compressed JSON vulnerability feeds, the "modified" feeds should be used to keep up-to-date.

Each feed is updated nightly, but only if the content of that feed has changed. For example, the 2004 feeds will be updated only if there is an addition or modification to any vulnerability with a starting CVE® identifier of "CVE-2004-". The "recent" feeds are a list of recently published vulnerabilities and the "modified" feeds are a list of recently published and modified vulnerabilities. The "recent" and "modified" feeds only contain vulnerabilities changed within the previous eight days. These feeds are updated approximately every two hours.

META Files

Users should always consult the META file to determine if a given feed has been updated since the last import. If no changes have been made there is no benefit to downloading either the .zip or .gz files. This approach should result in a reasonable use of less than 200 requests per day.

Each of the data feeds is described by an associated plain text file with the same name as the .xml/.json file with a .meta extension. These files are updated approximately every two hours to reflect changes within their respective feed file. For example, if the name of the file is nvdcve-2.0-modified.json then the .meta file name will be nvdcve-2.0-modified.meta. The .meta file contains information about the specific feed file including the last modified date and time, the size of the file uncompressed, and a SHA256 value of the uncompressed file:

lastModifiedDate:2015-09-10T08:40:09-04:00
size:1273382
zipSize:91619
gzSize:91477
sha256:ac782e2db403e2b09ad5dd676501e8755fda3f2bef347b7503491700c6c5eaff

JSON 2.0 Feeds

These data feeds include updated NVD data in the new 2.0 JSON format. The "year" feeds are updated once per day, while the "recent" and "modified" feeds are updated every two hours.

Schema Version 2.0 NVD JSON 2.0 Schema
Feed Updated Download Size (MB)
CVE-Modified 09/01/2025; 1:00:01 AM -0400 META
GZ 0.93 MB
ZIP 0.93 MB
CVE-Recent 09/01/2025; 1:00:00 AM -0400 META
GZ 0.22 MB
ZIP 0.22 MB
CVE-2025 09/01/2025; 3:00:04 AM -0400 META
GZ 9.61 MB
ZIP 9.61 MB
CVE-2024 09/01/2025; 3:00:18 AM -0400 META
GZ 18.06 MB
ZIP 18.06 MB
CVE-2023 08/31/2025; 3:00:38 AM -0400 META
GZ 15.33 MB
ZIP 15.33 MB
CVE-2022 08/30/2025; 3:00:56 AM -0400 META
GZ 14.88 MB
ZIP 14.88 MB
CVE-2021 08/30/2025; 3:01:12 AM -0400 META
GZ 14.71 MB
ZIP 14.71 MB
CVE-2020 08/30/2025; 3:01:28 AM -0400 META
GZ 12.34 MB
ZIP 12.34 MB
CVE-2019 08/28/2025; 3:02:04 AM -0400 META
GZ 8.96 MB
ZIP 8.96 MB
CVE-2018 08/30/2025; 3:01:41 AM -0400 META
GZ 7.40 MB
ZIP 7.40 MB
CVE-2017 08/30/2025; 3:01:50 AM -0400 META
GZ 6.90 MB
ZIP 6.90 MB
CVE-2016 08/15/2025; 3:01:46 AM -0400 META
GZ 4.70 MB
ZIP 4.70 MB
CVE-2015 08/30/2025; 3:01:59 AM -0400 META
GZ 3.86 MB
ZIP 3.86 MB
CVE-2014 08/30/2025; 3:02:04 AM -0400 META
GZ 4.20 MB
ZIP 4.20 MB
CVE-2013 08/28/2025; 3:02:42 AM -0400 META
GZ 5.40 MB
ZIP 5.40 MB
CVE-2012 08/31/2025; 3:00:54 AM -0400 META
GZ 4.49 MB
ZIP 4.49 MB
CVE-2011 08/31/2025; 3:00:59 AM -0400 META
GZ 3.99 MB
ZIP 3.99 MB
CVE-2010 08/31/2025; 3:01:03 AM -0400 META
GZ 4.07 MB
ZIP 4.07 MB
CVE-2009 08/31/2025; 3:01:08 AM -0400 META
GZ 4.25 MB
ZIP 4.25 MB
CVE-2008 08/31/2025; 3:01:12 AM -0400 META
GZ 3.91 MB
ZIP 3.91 MB
CVE-2007 08/13/2025; 3:02:30 AM -0400 META
GZ 3.36 MB
ZIP 3.36 MB
CVE-2006 06/20/2025; 3:01:32 AM -0400 META
GZ 3.26 MB
ZIP 3.26 MB
CVE-2005 08/31/2025; 3:01:16 AM -0400 META
GZ 2.02 MB
ZIP 2.02 MB
CVE-2004 07/30/2025; 3:02:38 AM -0400 META
GZ 1.39 MB
ZIP 1.39 MB
CVE-2003 05/23/2025; 3:01:42 AM -0400 META
GZ 0.68 MB
ZIP 0.68 MB
CVE-2002 08/28/2025; 3:02:54 AM -0400 META
GZ 2.00 MB
ZIP 2.00 MB
Schema Version 2.0 NVD CPE Match Feed 2.0 Schema
Feed Updated Download Size (MB)
CPE-Match 2.0 08/29/2025; 11:40:00 PM -0400 META
GZ 532.05 MB
ZIP 532.06 MB
Schema Version 2.0 CPE Dictionary 2.0 Schema
Feed Updated Download Size (MB)
CPE Dictionary 2.0 08/29/2025; 11:50:00 PM -0400 META
GZ 65.67 MB
ZIP 65.68 MB

Vulnerability Vendor Comments

NVD provides a service whereby software development organizations can submit "Official Vendor Comments" on the set of CVE vulnerabilities that apply to their products. Organizations can submit comments by contacting NVD staff at [email protected] . More information is provided on the vendor comment page.

All of the vendors comments can be downloaded from the following XML feed which is updated every 2 hours:

Feed Updated Download Size (MB)
Vendor Comments 09/01/2025; 12:45:02 AM -0400 META
GZ 0.07 MB
ZIP 0.07 MB

NVD/CVE Translated XML Feed (version 1.0)

NVD provides an XML feed for translations of CVE vulnerabilities into other languages.

Currently, INCIBE (Spanish National Cybersecurity Institute) is translating vulnerabilities into Spanish. INCIBE is solely responsible for the Spanish translation content. Incibe Logo

Schema Version 1 NVD/CVE Translation XML Schema
Feed Updated Download Size (MB)
CVE-Modified 09/01/2025; 12:40:01 AM -0400 META
GZ 0.08 MB
ZIP 0.08 MB
CVE-2025 09/01/2025; 12:36:01 AM -0400 META
GZ 2.66 MB
ZIP 2.66 MB
CVE-2024 09/01/2025; 12:37:42 AM -0400 META
GZ 4.63 MB
ZIP 4.63 MB
CVE-2023 09/01/2025; 12:38:32 AM -0400 META
GZ 1.82 MB
ZIP 1.82 MB
CVE-2022 09/01/2025; 12:39:39 AM -0400 META
GZ 2.66 MB
ZIP 2.66 MB
CVE-2021 09/01/2025; 12:40:39 AM -0400 META
GZ 2.33 MB
ZIP 2.33 MB
CVE-2020 09/01/2025; 12:41:38 AM -0400 META
GZ 1.79 MB
ZIP 1.79 MB
CVE-2019 09/01/2025; 12:42:21 AM -0400 META
GZ 1.46 MB
ZIP 1.46 MB
CVE-2018 09/01/2025; 12:43:01 AM -0400 META
GZ 1.33 MB
ZIP 1.33 MB
CVE-2017 09/01/2025; 12:43:40 AM -0400 META
GZ 1.25 MB
ZIP 1.25 MB
CVE-2016 09/01/2025; 12:44:04 AM -0400 META
GZ 0.72 MB
ZIP 0.72 MB
CVE-2015 09/01/2025; 12:44:25 AM -0400 META
GZ 0.64 MB
ZIP 0.64 MB
CVE-2014 09/01/2025; 12:44:46 AM -0400 META
GZ 0.65 MB
ZIP 0.65 MB
CVE-2013 09/01/2025; 12:45:03 AM -0400 META
GZ 0.54 MB
ZIP 0.54 MB
CVE-2012 09/01/2025; 12:45:18 AM -0400 META
GZ 0.47 MB
ZIP 0.47 MB
CVE-2011 09/01/2025; 12:45:31 AM -0400 META
GZ 0.41 MB
ZIP 0.41 MB
CVE-2010 09/01/2025; 12:45:44 AM -0400 META
GZ 0.45 MB
ZIP 0.46 MB
CVE-2009 09/01/2025; 12:45:57 AM -0400 META
GZ 0.47 MB
ZIP 0.48 MB
CVE-2008 09/01/2025; 12:46:15 AM -0400 META
GZ 0.63 MB
ZIP 0.63 MB
CVE-2007 09/01/2025; 12:46:31 AM -0400 META
GZ 0.62 MB
ZIP 0.62 MB
CVE-2006 09/01/2025; 12:46:43 AM -0400 META
GZ 0.39 MB
ZIP 0.39 MB
CVE-2005 09/01/2025; 12:46:45 AM -0400 META
GZ 0.04 MB
ZIP 0.04 MB
CVE-2004 09/01/2025; 12:46:47 AM -0400 META
GZ 0.06 MB
ZIP 0.06 MB
CVE-2003 09/01/2025; 12:46:50 AM -0400 META
GZ 0.07 MB
ZIP 0.07 MB
CVE-2002 09/01/2025; 12:46:53 AM -0400 META
GZ 0.07 MB
ZIP 0.07 MB
Created September 20, 2022 , Updated August 20, 2025