The Correlated Vulnerability And Threat Intelligence Database API
Latest commit d3abfee Mar 12, 2017 @toolswatch committed with Support to automated database update using private dropbox repo

vFeed The Correlated Vulnerability and Threat Intelligence Database Wrapper


Build Status Code Health Compatibility Compatibility Compatibility

vFeed Python Wrapper / Database is a CVE, CWE, and OVAL Compatible naming scheme concept that provides extra structured detailed third-party references and technical characteristics for a CVE entry through an extensible XML/JSON schema. It also improves the reliability of CVEs by providing a flexible and comprehensive vocabulary for describing the relationship with other standards and security references.

vFeed API generates a JSON-based format outputs to describe in detail vulnerabilities. It can be leveraged as input by security researchers, practitioners, and tools as part of their vulnerability description. The standard syntax is easy to interpret by humans and systems.

The mandatory associated vFeed DB (The Correlated Vulnerability and Threat Intelligence Database) is a detective and preventive security information repository used for gathering vulnerability and mitigation data from scattered internet sources into an unified database. The vFeed DB must be obtained directly from vFeed IO.

  • Open security standards:

  • Vulnerability Assessment & Exploitation IDs (Metasploit, SAINT Corporation, Tenable's Nessus Plugin IDs, Nmap, Exploit-DB)

  • Vendors Security Alerts:

    • Microsoft MS
    • Mandriva
    • Redhat
    • Cisco
    • Sun
    • Gentoo
    • Ubuntu
    • And more ...

Key features

  • Registered as CVE, CWE, and OVAL Compatible by the Mitre Corporation
  • Support Open Standards such as CVE, CPE, CWE, CAPEC, WASC, CVSS and more
  • Downloadable as SQLite database
  • Support correlation with 3rd-party security references IAVA, OVAL and more
  • Support correlation with security assessment and patch vendors (Nessus, Exploit-DB, Redhat, Microsoft..)
  • Easy and ready-to-use python Wrapper

More features at vFeed IO.

Target Audience

  • Penetration testers who want to analyze CVEs and gather extra information to help shape avenues to exploit vulnerabilities.
  • Security auditors who want to report accurate information about findings. vFeed could be the best way to describe a CVE with attributes based on standards and 3rd party references as vendors or companies involved into standarization efforts.
  • Security tools vendors / security open source developers who need to implement libraries to enumerate useful information about CVEs without wasting time to correlate and to create a proprietary database. vFeed is by far the best solution. Methods can be invoked from programs or scripts with a simple call.
  • Any security hacker who is conducting research and needs a very fast and accurate way to enumerate available exploits or techniques to check a vulnerability.

How to ?

Run -h for help. Refer to the Documentation official documentation page.

Latest release


  • [New] Reactivated the ability to automate the download process for Consultancy / Integrator plans using private Dropbox repository.
  • [Improve] Improved the to check whether SQLite exists. Thanks to Alex Faraino (
  • [Fix] Modified vfeedcli from API to wrapper.
  • [Doc] Documentation updated to reflect the new changes.

  • [Fix] Fixed issue #72. Migration was not working for ubuntu and debian.
  • [Improve] Improved the check_mongo() to support tp linux and OSX.


  • [New] Updated and optimized search function with new keys (cve, cpe, cwe, oval and text). Please refer to documentation
  • [New] The search result is returned as JSON content. It may contain references to exploits whenever they are available
  • [New] Added support to Python3. Thanks to Elnappo (
  • [Fix] Fixed issue #64. The CLI is separated from the library.
  • [Fix] Fixed issue #67. Modified the to reflect The OVAL repository new URL hosted by CIS.


  • The vFeed DB is no more available through update command. The command is deprecated.
  • The delivery of the vFeed DB was handed over to a new established entity vFeed IO. This entity sets the goal to become the Leading Provider of Vulnerability and Threat Intelligence Database.
  • The API has been modified to reflect the new changes.


  • Added support to CAPEC version 2.8. Check about CAPEC v2.8.
  • Added support to CWE v2.9. Check the full changelog.
  • Added mapping to WASC v2.0 Threat Classification.
  • Added CVSS v2.0 vectors to class. Now, the methods get_cvss and get_severity display the vector when available.
  • Added new method get_wasc to reflect the new mapping with WASC v2.0. The method returns ID, Title and URL when available.
  • Modified the method get_capec to return the following:
  • Reflected the changes in cvsexports.sql MongoDB script to generate the new added tables.
  • vFeed.db the correlated vulnerability & threat database fully regenerated to support the new changes.
  • Documentation updated accordingly.

NOTE: Some code was cleaned. Nevertheless, the issues reported here will be fixed in next minor version.