Skip to content

Collections

This page documents archive/collection-related endpoints: retrieving CVE archives per OS, fetching published collections from the CDN, getting collection updates from the database, and retrieving bulletin history. All examples use API key authentication via the X-Api-Key header.

Open interactive specs

Get CVEs for os+version

Download a prebuilt archive (zip) of CVEs for a specific OS and version.

Auth: X-Api-Key header required.

Parameters:

Name In Type Required Description
os query string yes OS name (e.g. ubuntu, debian)
version query string yes OS version (e.g. 23.04, 20.04)

Usage:

Query:

GET /api/v3/archive/distributive/

Query example:

curl -G "https://vulners.com/api/v3/archive/distributive/" -H "X-Api-Key: YOUR_API_KEY" \
  --data-urlencode "os=ubuntu" \
  --data-urlencode "version=23.04" \
  --output output_data.zip

vulners_api.archive.get_distributive("ubuntu", "23.04")
    Full archive

Get collection by name

This method is available in the Vulners Python SDK starting from version 3.0.

Fetch the full collection archive file (records) for a named collection from the CDN. Collections are updated on the CDN every 4 hours; records are sorted by timestamps.updated (newest → oldest). Timestamps are UTC.

Parameters:

Name In Type Required Description
type query string yes Collection type name (see available collections on the Vulners stats page, e.g. exploitdb)

Returns list of records from the collection archive stored on CDN. These archives are updated every 4 hours.

The records in response are sorted by timestamps.updated from newest to oldest. All timestamps are in UTC.

Usage:

Query:

GET /api/v4/archive/collection/

Query example:

curl -GOJL "https://vulners.com/api/v4/archive/collection/" -H "X-Api-Key: YOUR_API_KEY" \
    --data-urlencode "type=exploitdb"
vulners_api.archive.fetch_collection(type='exploitdb')
[
    {'id': 'EDB-ID:20048', ... 'timestamps.updated': '2025-05-21T13:14:26.791000+00:00', ...},
    {'id': 'EDB-ID:18781', ... 'timestamps.updated': '2025-05-21T13:14:26.648000+00:00', ...},
    {'id': 'EDB-ID:30807', ... 'timestamps.updated': '2025-05-21T11:54:55.905000+00:00', ...},
    {'id': 'EDB-ID:31180', ... 'timestamps.updated': '2025-05-21T11:54:55.150000+00:00', ...},
    ...,
    {'id': 'EDB-ID:46363', ... 'timestamps.updated': '2025-04-02T20:47:28+00:00', ...}
]

Get collection update by name

Note: This method is available in the Vulners Python SDK starting from version 3.0.

Get recently updated records for a collection directly from the database. Useful for incremental synchronization.

Auth: X-Api-Key header required.

Parameters:

Name In Type Required Description
type query string yes Collection type name (e.g. exploitdb)
after query string (ISO 8601) yes Return records updated after this UTC timestamp. Must not be more than 25 hours from the current time. Example: 2025-05-21T13:14:26

Returns list of records for the collection directly from the database.

The records in responce are sorted by timestamps.updated from newest to oldest. All timestamps are in UCT.

Usage:

Query:

GET /api/v4/archive/collection-update/

Query example:

curl -GOJL "https://vulners.com/api/v4/archive/collection-update/" -H "X-Api-Key: YOUR_API_KEY" \
    --data-urlencode "type=exploitdb" \
    --data-urlencode "after=2025-05-21T13:14:26" \
vulners_api.archive.fetch_collection_update(type='exploitdb', after="2025-05-21T13:14:26")
[
    {'id': 'EDB-ID:30632', ... 'timestamps.updated': '2025-05-21T14:59:28.854000+00:00', ...},
    {'id': 'EDB-ID:4779', ... 'timestamps.updated': '2025-05-21T14:04:18.852000+00:00', ...},
    {'id': 'EDB-ID:4779', ... 'timestamps.updated': '2025-05-21T14:04:18.852000+00:00', ...}
]

Get bulletin history

Retrieve historical editions/changes for a bulletin (field-by-field history entries such as cvss3, epss, etc.).

Auth: X-Api-Key header required.

Parameters:

Name In Type Required Description
id body string yes Bulletin identifier (e.g. CVE-2024-23622)

Usage:

Query:

POST /api/v3/search/history/

Query example:

curl -XPOST https://vulners.com/api/v3/search/history/ -H "X-Api-Key: YOUR_API_KEY" -H 'Content-Type: application/json' -d '{
"id": "CVE-2024-23622"
}'

    vulners_api.search.get_bulletin_history("CVE-2024-23622")
[
    {
        "bulletinId": "CVE-2024-23622",
        "field": "cvss3",
        "value": {
            "cvssV3": {
                "version": "3.1",
                "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                "attackVector": "NETWORK",
                "attackComplexity": "LOW",
                "privilegesRequired": "NONE",
                "userInteraction": "NONE",
                "scope": "UNCHANGED",
                "confidentialityImpact": "HIGH",
                "integrityImpact": "HIGH",
                "availabilityImpact": "HIGH",
                "baseScore": 9.8,
                "baseSeverity": "CRITICAL"
            }
        },
        "edition": 1,
        "published": "2024-01-31T23:48:24"
    },
    {
        "bulletinId": "CVE-2024-23622",
        "field": "epss",
        "value": [
            {
                "cve": "CVE-2024-23622",
                "epss": 0.0027,
                "percentile": 0.64574,
                "modified": "2024-01-31"
            }
        ],
        "edition": 1,
        "published": "2024-01-31T23:48:24"
    },
]