Data source: NIST NVD 2.0 API (nvd.nist.gov)
https://context.gnist.ai/rest/nvd/
AuthenticationAll requests require a Gnist-API-Key header (or api_key query parameter).
Free tier: 100 calls/day. Get your API key.
Tools (4)
search_cvesSearch the NIST National Vulnerability Database for CVEs.
Query CVE records by keyword, severity, date range, or affected product.
Returns vulnerability details including CVSS scores, CWE weaknesses,
references, and affected products (CPE names).
Args:
keyword: Keyword to search in CVE descriptions.
cve_id: Specific CVE ID for exact match lookup.
severity: CVSS v3 severity filter: LOW, MEDIUM, HIGH, or CRITICAL.
pub_start_date: Filter CVEs published after this date (ISO 8601).
pub_end_date: Filter CVEs published before this date (ISO 8601).
cpe_name: CPE match string for affected product.
results_per_page: Maximum results (1-50, default 10).
Returns:
Dict with 'source', 'count', 'total_results', and 'cves' list.
Each CVE includes id, description, CVSS scores, CWEs, and references.
| Parameter | Type | Required | Description |
|---|---|---|---|
keyword | any | optional | Keyword to search CVE descriptions (e.g. "buffer overflow", "SQL injection"). |
cve_id | any | optional | Specific CVE ID (e.g. "CVE-2024-0001"). Returns exact match. |
severity | any | optional | CVSS v3 severity: "LOW", "MEDIUM", "HIGH", or "CRITICAL". |
pub_start_date | any | optional | Start of publication date range (ISO 8601, e.g. "2024-01-01T00:00:00.000"). |
pub_end_date | any | optional | End of publication date range (ISO 8601, e.g. "2024-12-31T23:59:59.999"). |
cpe_name | any | optional | CPE match string for affected product (e.g. "cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*"). |
results_per_page | integer | optional | Maximum results to return (1-50, default 10). (default: 10) |
{
"query": "example"
}get_cveGet full details for a specific CVE from the National Vulnerability Database.
Returns complete vulnerability information including CVSS scores from
multiple sources, CWE weakness classifications, advisory references,
and affected product CPE names.
Args:
cve_id: CVE identifier (e.g. "CVE-2021-44228" for Log4Shell).
Returns:
Dict with 'source' and 'cve' containing full vulnerability details,
or 'cve': None if the CVE ID is not found.
| Parameter | Type | Required | Description |
|---|---|---|---|
cve_id | string | required | CVE identifier (e.g. "CVE-2024-0001", "CVE-2021-44228"). |
{
"cve_id": "example"
}get_cve_historyGet the change history for a specific CVE.
Shows how a CVE record has been modified over time, including initial
analysis, score changes, reference additions, and status updates.
Useful for tracking how vulnerability assessments evolved.
Args:
cve_id: CVE identifier (e.g. "CVE-2021-44228").
Returns:
Dict with 'source', 'count', and 'history' list. Each entry includes
event name, creation date, source, and change details.
| Parameter | Type | Required | Description |
|---|---|---|---|
cve_id | string | required | CVE identifier (e.g. "CVE-2024-0001"). |
{
"cve_id": "example"
}report_feedbackReport a bug, feature request, or general feedback for this data source.
Use this when something doesn't work as expected, when you'd like
a new feature, or when you have suggestions for improvement.
Args:
feedback: Describe the issue or suggestion.
feedback_type: One of 'bug', 'feature_request', or 'general'.
| Parameter | Type | Required | Description |
|---|---|---|---|
feedback | string | required | |
feedback_type | string | optional | (default: "general") |
{
"feedback": "example"
}Quick Start
curl -X POST "https://context.gnist.ai/rest/nvd/get_cve" \
-H "Content-Type: application/json" \
-H "Gnist-API-Key: YOUR_API_KEY" \
-d '{"cve_id": "example"}'
import httpx
resp = httpx.post(
"https://context.gnist.ai/rest/nvd/get_cve",
headers={"Gnist-API-Key": "YOUR_API_KEY"},
json={
"cve_id": "example"
},
)
print(resp.json())