/api/v1/public/cves/summaryOverall counts (total + by severity + last 30 days) and the live NVD poller's health snapshot. Updated continuously.
curl https://app.echelongraph.io/api/v1/public/cves/summary
JSON + NDJSON access to the same vulnerability intelligence behind /pulse: NVD CVSS, EchelonGraph synthesised score, CISA KEV flag, FIRST EPSS percentile, GHSA links, and vendor advisory cross-walks (Microsoft, Red Hat, Cisco, AWS, GCP, GitLab).
No API key required. Rate-limited at 60 requests per minute per IP via our WAF. Need higher throughput? Get in touch.
Every endpoint is GET-only and returns JSON. Try this Log4Shell lookup:
curl https://app.echelongraph.io/api/v1/public/cves/CVE-2021-44228 | jq .
/api/v1/public/cves/summaryOverall counts (total + by severity + last 30 days) and the live NVD poller's health snapshot. Updated continuously.
curl https://app.echelongraph.io/api/v1/public/cves/summary
/api/v1/public/cves/{id}Single CVE record. Returns the merged view: NVD CVSS, EchelonGraph synthesised score (when available), KEV/EPSS signals, GHSA references, vendor advisory cross-links.
curl https://app.echelongraph.io/api/v1/public/cves/CVE-2021-44228
/api/v1/public/cves/{id}/relatedThree categories of related CVEs (same_product / same_vendor / same_cwe), 10 each, ranked by EchelonGraph score. Powers the sidebar on every /pulse/{id} page.
curl https://app.echelongraph.io/api/v1/public/cves/CVE-2021-44228/related
/api/v1/public/cves/{id}/referencesPer-reference enrichment for one CVE — vendor advisory cross-walks, patch URLs, exploit POC indicators where surfaced.
curl https://app.echelongraph.io/api/v1/public/cves/CVE-2021-44228/references
/api/v1/public/cves/trendsWeekly + monthly volume + week-over-week delta + severity distribution. Backs the dashboard cards on /pulse.
curl https://app.echelongraph.io/api/v1/public/cves/trends
/api/v1/public/cves/export.ndjsonStreaming NDJSON bulk export — one CVE per line. Filters: year, severity, kev_only, min_cvss. Hard cap 50,000 rows per call (iterate via the year param for the full dataset).
curl "https://app.echelongraph.io/api/v1/public/cves/export.ndjson?year=2024&severity=CRITICAL&kev_only=true" | jq -c .
/api/v1/public/vendor-advisoriesVendor-disclosed security advisories (Microsoft MSRC, Red Hat RHSA, GitHub GHSA, Cisco PSIRT, AWS, GCP, GitLab). Many appear here before NVD assigns a CVE-ID.
curl https://app.echelongraph.io/api/v1/public/vendor-advisories?has_cve=true&limit=50
/api/v1/public/vendor-advisories/{vendor}/{advisory_id}Single vendor-advisory detail — title, description, CVSS, affected products, remediation, references, linked CVE IDs.
curl https://app.echelongraph.io/api/v1/public/vendor-advisories/github/GHSA-99gv-2m7h-3hh9
For researchers + security teams who want offline analysis. The export streams one CVE per line as JSON (NDJSON / JSON Lines), so you can pipe it through jq -c . or process incrementally without buffering the whole dataset.
# All KEV-listed CVEs published in 2024
curl "https://app.echelongraph.io/api/v1/public/cves/export.ndjson?year=2024&kev_only=true" \
| jq -c '{cve_id, severity, echelongraph_score, kev_added: .kev_added_date}'
# Full 2023 CRITICAL dataset
curl "https://app.echelongraph.io/api/v1/public/cves/export.ndjson?year=2023&severity=CRITICAL" \
> cves-2023-critical.ndjsonHard cap: 50,000 rows per call. Iterate via the year param for the full dataset. The endpoint streams from a DB cursor, so memory pressure stays flat regardless of result size.
Subscribe to real-time or digest alerts covering NVD + vendor-disclosed advisories.
Subscribe via /pulse →/api/v1/. Breaking changes will land under /api/v2/ with a deprecation window.modified timestamp wins. See Why is the EG score different from NVD?