/api/Search

The Vulnerability Search API endpoint empowers clients to perform advanced, flexible searches over a large corpus of vulnerability data. It is designed to support a wide variety of use cases, including threat intelligence analysis, vulnerability management workflows, reporting, and automated ingestion into security platforms.

This endpoint provides a robust and highly customizable interface through an extensive set of query parameters. Users can precisely filter and narrow down results based on:

Free-text search in titles, descriptions, and metadata,

Specific vendor and product names to isolate relevant software or hardware vulnerabilities,

Date ranges for when vulnerabilities were identified or last updated,

Severity scoring filters using CVSS (Common Vulnerability Scoring System) and EPSS (Exploit Prediction Scoring System),

Risk ratings to capture organizational severity categories,

Tags for thematic or contextual classification (e.g., ransomware, zero-day, remote code execution),

Options to include advanced metadata, return only IDs, and control pagination of results.

Whether the goal is to locate high-risk vulnerabilities for a particular vendor in a defined timeframe or to extract a structured list of vulnerability IDs for automation purposes, this endpoint enables deep and accurate data access with high performance and clarity.

✅ Common Use Cases
Identify all critical vulnerabilities affecting a given vendor and product in the last 30 days.

Export a list of vulnerability IDs with a CVSS score above 7.5 and EPSS score above 0.5.

Filter vulnerabilities by assigned tags such as supply-chain, rce, or phishing.

Generate weekly or monthly reports based on date filters and severity levels.

Drive automated remediation workflows by pulling targeted vulnerability sets

Parameter

Type

Required

Description

text

string

Yes

General text search across vulnerability descriptions and metadata.

vendorSearchValue

string

Yes

Filters vulnerabilities by vendor name.

productSearchValue

string

Yes

Filters vulnerabilities by product name.

dateIdentifiedFrom

string (ISO 8601 date)

Yes

Start date for the "identified" date range filter.

dateIdentifiedTo

string (ISO 8601 date)

Yes

End date for the "identified" date range filter.

dateUpdatedFrom

string (ISO 8601 date)

Yes

Start date for the "updated" date range filter.

dateUpdatedTo

string (ISO 8601 date)

Yes

End date for the "updated" date range filter.

tags

string[]

Yes

List of tags to filter vulnerabilities (e.g., `["CisaKev","NotInNvd",

"PotentialPoc", "MetasploitModule", "NucleiTemplate", "PatchTuesday", "PotentialPublicExploit", "CytidelSpotlight", "KnownThreatActor", "GithubRepo"]`).

cvssScoreFrom

number

Yes

Minimum CVSS score for filtering.

cvssScoreTo

number

Yes

Maximum CVSS score for filtering.

epssScoreFrom

number

Yes

Minimum EPSS score for filtering.

epssScoreTo

number

Yes

Maximum EPSS score for filtering.

lowRiskRating

boolean

Yes

Include vulnerabilities with a Low risk rating.

moderateRiskRating

boolean

Yes

Include vulnerabilities with a Moderate risk rating.

elevatedRiskRating

boolean

Yes

Include vulnerabilities with an Elevated risk rating.

highRiskRating

boolean

Yes

Include vulnerabilities with a High risk rating.

significantRiskRating

boolean

Yes

Include vulnerabilities with a Significant risk rating.

textFilter

string

Yes

Additional keyword filter on free-form text fields.

includeAdvancedData

boolean

Yes

If true, includes extended metadata in the response.

onlyVulnerabilityIds

boolean

Yes

If true, response will return only vulnerability IDs without full details.

page

number

Yes

Page number for pagination.

size

number

Yes

Number of results per page.

Language
Credentials
Click Try It! to start a request and see the response here!