CVEdetails.com supports Trusted Automated Exchange of Intelligence Information (TAXII) version 2.1 and provides CVE collections and objects in Structured Threat Information Expression (STIX) version 2.1 format. Only GET methods are supported and it's not possible to create, delete or modify objects using the taxii protocol.

Discovery endpoint https://www.cvedetails.com/taxii2/
API root https://www.cvedetails.com/taxii2/api/v1/
Collections url https://www.cvedetails.com/taxii2/api/v1/collections/
cve collection https://www.cvedetails.com/taxii2/api/v1/collections/cve/
This collection returns CVEs as STIX objects extending the standard STIX vulnerability object.
cve-2 collection https://www.cvedetails.com/taxii2/api/v1/collections/cve-2/
This collection returns CVEs as custom STIX objects (you can use this collection with Anomali ThreatStream).
Get object endpoints Both cve and cve-2 collections support get object calls for individual CVEs. Get object responses will include CVE timeline as well (timeline is not included in responses return by collection lists).

Authentication

All Taxii calls require authentication. You can either use Bearer access tokens or use Http Basic authentication (e.g if the third party tool you are using does not support the Bearer scheme).

When using basic authentication, you MUST use an access token as the password value. We do not actually support basic authentication but just emulate it using an access token as the password. You can use any username value which will be ignored.

Do not use a password for authentication, using a password will not work!

See APIs page for more information on access tokens and rate limiting. All requirements and rate limits which apply to other API calls apply to Taxii calls as well.

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!