Everything Deepinfo knows about one CVE, in one call.

Pass a CVE ID. Get back the full enriched record: CVSS, EPSS, CISA KEV, CWE, affected products, references, and Deepinfo-specific risk scoring.

WHAT THIS API RETURNS

The full enrichment surface, for one CVE.

The Vulnerability Detail API is the per-record version of Vulnerability Search. Pass one CVE ID and the API returns the full enriched record: published date, CVSS metric, EPSS exploit-prediction score, CISA KEV active-exploitation flag, CWE classification, affected vendor and product set, references, and Deepinfo-specific risk scoring.

Use this when you have a specific CVE ID and need the full context behind a finding instead of running a corpus filter. The response is shaped to be self-contained: every field that Search exposes for filtering is present here for direct read.

Every CVE returned by Vulnerability Finder against a target carries the ID needed to call Vulnerability Detail directly. The two APIs compose cleanly.

REQUEST

One endpoint, one required parameter.

Endpoint:

GET https://api.deepinfo.com/v1/discovery/vulnerability-detail?cve={cve}

Parameters:

Name In Type Required Description
cve query string Yes A CVE identifier such as CVE-2026-1842.

Authentication is by API token in the request header. See docs.deepinfo.com for the full request reference.

SAMPLE RESPONSE

See what the API returns.

Real response structure for the Everything Deepinfo knows about one CVE, in one call endpoint. Field coverage may vary based on query parameters and data availability.

JSON RESPONSE
{
  "id": "CVE-2026-1842",
  "source_identifier": "[email protected]",
  "published": "2026-04-08T00:00:00Z",
  "last_modified": "2026-04-22T18:14:00Z",
  "status": "Modified",
  "summary": "Remote code execution in Example Vendor Product before 4.2.",
  "enrichment": {
    "cpe": [{"vendor": "example-vendor", "product": "example-product", "version_lt": "4.2"}],
    "vdeep_metric": {
      "cvss_data": {"base_score": 9.8, "base_severity": "CRITICAL"},
      "deepinfo_risk_score": 94
    },
    "epss_score": {"epss": 0.94, "percentile": 0.999},
    "cisa_kev": {"is_listed": true, "date_added": "2026-04-12", "due_date": "2026-05-03"},
    "cwe": [{"id": "CWE-94", "name": "Improper Control of Generation of Code"}]
  },
  "references": ["https://example-vendor.com/security/CVE-2026-1842"]
}
STRUCTURED VIEW
Fields
Id
CVE-2026-1842
Source identifier
Published
2026-04-08T00:00:00Z
Last modified
2026-04-22T18:14:00Z
Status
Modified
Summary
Remote code execution in Example Vendor Product before 4.2.
Enrichment
Cpe
1 items
Vdeep metric
{2 fields}
Epss score
{2 fields}
Cisa kev
{3 fields}
Cwe
1 items
References
Count
1
Items
https://example-vendor.com/security/CVE-2026-1842

Sample response shown. Real responses depend on query parameters, data availability, and API version. Talk to us for full schema documentation.

“EPSS, CISA KEV, and CWE all in the same record means we don't normalize across three NVD-adjacent sources anymore. Risk scoring is consistent because the input data is consistent.”

— Engineering Director, Vulnerability Management Platform
GET STARTED

Pull the full CVE record, or batch lookup your queue.

We'll set up token access and answer schema questions on a call.

Talk to us Browse API docs