CVE Response

Data Dictionary: CVE Response

This outlines the field types associated with the CVE Lookup Endpoint.

Field NameField TypeExampleDescription
idstringCVE-2024-12345The CVE ID
detailsobject{
"vulnerability_name": "Acme Inc Expoilt Attempt",
"vulnerability_description": "Potentially allowing Acme Inc to exploit anvil drop on new users.",
"cve_cvss_score": 4.5,
"product": "Acme Inc",
"vendor": "Anvil Drop",
"published_to_nist_nvd": true
}
Metadata object with basic details on the CVE
details.vulnerability_namestringAcme Inc Expoilt AttemptThe name of the vulnerability
details.vulnerability_descriptionstringPotentially allowing Acme Inc to exploit anvil drop on new users."A description of the vulnerability
details.cve_cvss_scorefloat4.5The current CVSS score (Common Vulnerability Scoring System)
details.productstringAcme IncThe produc(s) associated with CVE
details.vendorstringAnvil DropThe Vendor(s) associated with CVE
details.published_to_nist_nvdboolantrueWhether this CVE is recognized by NIST
timelineobject{
"cve_published_date": "2024-05-28T19:15:10.060",
"cve_last_updated_date": "2024-05-31T16:04:09.703",
"first_known_published_date": "2024-05-27T00:00:00Z",
"cisa_kev_date_added": "2024-05-30T00:00:00Z"
}
timeline.cve_published_datedatetime2024-05-28T19:15:10.060Date when CVE was published by NVD
timeline.cve_last_updated_datedatetime2024-05-31T16:04:09.703Date when CVE record was last updated
timeline.first_known_published_datedatetime2024-05-27T00:00:00ZDate when first exploit associated with CVE was published
timeline.cisa_kev_date_addeddatetime2024-05-30T00:00:00ZDate CISA added KEV entry associated with CVE
exploitation_detailsobject{
"attack_vector": "NETWORK",
"exploit_found": true,
"exploitation_registered_in_kev": true,
"epss_score": 0.94504
}
exploitation_details.attack_vectorstringNETWORKThe attack vector category
exploitation_details.exploit_foundbooleantrueWhether any known exploits are available
exploitation_details.exploitation_registered_in_kevbooleantrueWhether exploitation has been registered in KEV database
exploitation_details.epss_scorefloat0.94504EPSS Score associated with this exploitation (Exploit Prediction Scoring System)
exploitation_statsobject{
"number_of_available_exploits": 60,
"number_of_threat_actors_exploiting_vulnerability": 1,
"number_of_botnets_exploiting_vulnerability": 0
}
exploitation_stats.number_of_available_exploitsinteger60The total number of exploits available (public + commercial)
exploitation_stats.number_of_threat_actors_exploiting_vulnerabilityinteger1The total number of known threat actors
exploitation_stats.number_of_botnets_exploiting_vulnerabilityinteger0The total number of botnets
exploitation_activityobject{
"activity_seen": true,
"benign_ip_count_1d": 765,
"benign_ip_count_10d": 765,
"benign_ip_count_30d": 765,
"threat_ip_count_1d": 0,
"threat_ip_count_10d": 1,
"threat_ip_count_30d": 14
}
exploitation_activity.activity_seenbooleantrueWhether GreyNoise has seen activity
exploitation_activity.benign_ip_count_1dinteger765The total number of benign IP GreyNoise has seen exercising (Scanning || Exploiting) this vulnerability today
exploitation_activity.benign_ip_count_10dinteger765The total number of benign IP GreyNoise has seen exercising (Scanning || Exploiting) this vulnerability 10 days
exploitation_activity.benign_ip_count_30dinteger765The total number of benign IP GreyNoise has seen exercising (Scanning || Exploiting) this vulnerability 30 days
exploitation_activity.threat_ip_count_1dinteger0The total number of threat IP GreyNoise has seen exercising (Scanning || Exploiting) this vulnerability today
exploitation_activity.threat_ip_count_10dinteger1The total number of threat IP GreyNoise has seen exercising (Scanning || Exploiting) this vulnerability 10 days
exploitation_activity.threat_ip_count_30dinteger14The total number of threat IP GreyNoise has seen exercising (Scanning || Exploiting) this vulnerability 30 days