National Vulnerability Database

National Vulnerability Database

National Vulnerability

NVD Data Feeds


It is assumed that users of the data feeds provided on this page have a moderate level of understanding of the XML and/or JSON standard and XML or JSON related technologies as defined by Currently, the NVD provides no other specific tools or services for processing vulnerability data.

The entire NVD database can be downloaded from this web page for public use. All NIST publications are available in the public domain according to Title 17 of the United States Code, however acknowledgement of the NVD when using our information is always appreciated.

The following feeds are available: How to keep up-to-date with the NVD data
The main vulnerability feeds provide CVE® data organized by the first four digits of a CVE® identifier except for the 2002 feeds which include vulnerabilities prior to and including "CVE-2002-".  Each feed is updated only if the content of that feed has changed. For example the 2004 feeds will be updated only if there is an addition or modification to any vulnerability with a starting CVE® identifier of "CVE-2004-". In addition, the "recent" feeds are a list of recently published vulnerabilities and the "modified" feeds are a list of recently published and modified vulnerabilities where "recently" and "modified" are defined as the previous eight days. These feeds are updated approximately every two hours.

If you are locally mirroring the NVD data, the data feeds should be used to stay synchronized. After performing a one-time import of the complete data set using the compressed XML/JSON vulnerability feeds, the "modified" feeds should be used to keep up-to-date. The META file should be used to determine if a given feed has been updated since your last import. This helps prevent unnecessary downloads of the .zip or .gz files and should result in a reasonable use of less than 200 requests per day.

META Files

In addition, each of the data feeds is described by an associated plain text file with the same name as the .xml file with a .meta extension. These files are updated approximately every two hours to reflect changes within their respective feed file. For example, if the name of the file is nvdcve-2.0-Modified.xml then the .meta file name will be nvdcve-2.0-Modified.meta. The .meta file contains information about the specific feed including the last modified date and time, the size of the file uncompressed, and a SHA256 value of the uncompressed file:


JSON Feeds

NVD is now offering a vulnerability data feed using the JSON format. This data feed includes both previously offered and new NVD data points. Changes made throughout the BETA phase are visible by viewing the changelog.

    Version 1.1
NVD JSON 1.1 Schema
Feed Updated Download Size (MB)
CVE-Modified 8/12/2020 1:03:06 AM -04:00 META
GZ 0.23
ZIP 0.23
CVE-Recent 8/12/2020 1:00:09 AM -04:00 META
GZ 0.05
ZIP 0.05
CVE-2020 8/11/2020 3:13:00 AM -04:00 META
GZ 1.85
ZIP 1.85
CVE-2019 8/11/2020 3:40:50 AM -04:00 META
GZ 3.85
ZIP 3.85
CVE-2018 8/8/2020 4:02:50 AM -04:00 META
GZ 3.67
ZIP 3.67
CVE-2017 8/8/2020 4:20:15 AM -04:00 META
GZ 3.35
ZIP 3.35
CVE-2016 8/11/2020 3:51:02 AM -04:00 META
GZ 2.43
ZIP 2.43
CVE-2015 8/8/2020 4:35:55 AM -04:00 META
GZ 2.00
ZIP 2.00
CVE-2014 8/11/2020 3:56:23 AM -04:00 META
GZ 2.31
ZIP 2.31
CVE-2013 8/11/2020 4:00:30 AM -04:00 META
GZ 2.19
ZIP 2.19
CVE-2012 8/11/2020 4:04:19 AM -04:00 META
GZ 1.95
ZIP 1.95
CVE-2011 8/8/2020 4:55:27 AM -04:00 META
GZ 1.61
ZIP 1.61
CVE-2010 8/11/2020 4:08:27 AM -04:00 META
GZ 1.88
ZIP 1.88
CVE-2009 8/8/2020 5:02:22 AM -04:00 META
GZ 1.79
ZIP 1.79
CVE-2008 8/7/2020 5:03:54 AM -04:00 META
GZ 2.00
ZIP 2.00
CVE-2007 7/31/2020 4:28:59 AM -04:00 META
GZ 1.96
ZIP 1.96
CVE-2006 7/29/2020 5:04:49 AM -04:00 META
GZ 2.00
ZIP 2.00
CVE-2005 7/29/2020 5:06:44 AM -04:00 META
GZ 1.24
ZIP 1.24
CVE-2004 7/29/2020 5:07:52 AM -04:00 META
GZ 0.78
ZIP 0.78
CVE-2003 4/10/2020 4:41:40 AM -04:00 META
GZ 0.39
ZIP 0.39
CVE-2002 7/29/2020 5:10:02 AM -04:00 META
GZ 1.35
ZIP 1.35

XML Vulnerability Feeds


Per XML Vulnerability Feed Retirement Update the XML vulnerability data feeds are no longer displayed on this page.

CPE Match Feed

This data feed provides a list of all CVE applicability statement match criteria (CPE match strings and CPE match ranges) and the CPE URIs from the official CPE dictionary that match. If a CPE URI expected to match a given criteria is missing, please contact as those CPEs may need approved to the official CPE dictionary. This feed is updated on a daily basis.

    Version 1.0
NVD CPE Match Feed 1.0 Schema
Feed Updated Download Size (MB)
CPE Match 8/12/2020 12:12:42 AM -04:00 META
GZ 14.47
ZIP 14.47

RSS Vulnerability Feeds

NVD provides two RSS 1.0 data feeds. The first feed, nvd-rss.xml (zip or gz), provides information on all vulnerabilities within the previous eight days. The second feed, nvd-rss-analyzed.xml (zip or gz), provides only vulnerabilities which have been analyzed within the previous eight days. The advantage of the second feed is that we are able to provide vulnerable product names in the title. The advantage of the former is that you learn about new vulnerabilities as soon as possible.

Vulnerability Vendor Comments

NVD provides a service whereby software development organizations can submit "Official Vendor Comments" on the set of CVE vulnerabilities that apply to their products. Organizations can submit comments by contacting NVD staff at More information is provided on the vendor comment page.

All of the vendors comments can be downloaded from the following XML feed which is updated every 2 hours:

Feed Updated Download Size (MB)
Vendor Comments 8/12/2020 12:45:07 AM -04:00 META
GZ 0.07
ZIP 0.07

NVD/CVE Translated XML Feed (version 1.0)

NVD provides an XML feed for translations of CVE vulnerabilities into other languages.

Currently, INCIBE (Spanish National Cybersecurity Institute) is translating vulnerabilities into Spanish. INCIBE is solely responsible for the Spanish translation content.Incibe Logo

NVD/CVE Translation XML Schema File: nvdcvetrans.xsd

Feed Updated Download Size (MB)
CVE-Modified 8/12/2020 12:40:01 AM -04:00 META
GZ 0.02
ZIP 0.02
CVE-2020 8/12/2020 12:35:48 AM -04:00 META
GZ 0.73
ZIP 0.73
CVE-2019 8/12/2020 12:37:29 AM -04:00 META
GZ 1.39
ZIP 1.39
CVE-2018 8/12/2020 12:39:02 AM -04:00 META
GZ 1.30
ZIP 1.30
CVE-2017 8/12/2020 12:40:38 AM -04:00 META
GZ 1.25
ZIP 1.25
CVE-2016 8/12/2020 12:41:36 AM -04:00 META
GZ 0.72
ZIP 0.72
CVE-2015 8/12/2020 12:42:25 AM -04:00 META
GZ 0.63
ZIP 0.63
CVE-2014 8/12/2020 12:43:13 AM -04:00 META
GZ 0.65
ZIP 0.65
CVE-2013 8/12/2020 12:43:46 AM -04:00 META
GZ 0.54
ZIP 0.54
CVE-2012 8/12/2020 12:44:18 AM -04:00 META
GZ 0.47
ZIP 0.47
CVE-2011 8/12/2020 12:44:45 AM -04:00 META
GZ 0.41
ZIP 0.41
CVE-2010 8/12/2020 12:45:17 AM -04:00 META
GZ 0.45
ZIP 0.45
CVE-2009 8/12/2020 12:45:48 AM -04:00 META
GZ 0.48
ZIP 0.48
CVE-2008 8/12/2020 12:46:29 AM -04:00 META
GZ 0.64
ZIP 0.64
CVE-2007 8/12/2020 12:47:08 AM -04:00 META
GZ 0.63
ZIP 0.63
CVE-2006 8/12/2020 12:47:34 AM -04:00 META
GZ 0.39
ZIP 0.39
CVE-2005 8/12/2020 12:47:39 AM -04:00 META
GZ 0.04
ZIP 0.04
CVE-2004 8/12/2020 12:47:44 AM -04:00 META
GZ 0.06
ZIP 0.06
CVE-2003 8/12/2020 12:47:51 AM -04:00 META
GZ 0.07
ZIP 0.07
CVE-2002 8/12/2020 12:47:57 AM -04:00 META
GZ 0.07
ZIP 0.07

National Checklist Program (NCP) Checklists

Note: As of April 2017, the checklist schema was revised to make the SHA-1 element optional in accordance with NISTSP-131Ar1.
Note: As of July 2017, tier has been made optional to support changes in the current draft of 800-70 Rev 4.

NCP/Checklist XML 0.1 Information:

NCP/Checklist XML 0.1 Data Files: checklist-0.1-feed.xml (zip or gz)
checklist-0.1-feed-modified.xml (zip or gz)

checklist-0.1-feed.xml includes all checklists contained within the NCP repository checklist-0.1-feed-modified.xml includes all recently modified checklists within the NCP repository