Skip to content
VDB Command Reference

VDB Command Reference

The vdb subcommand provides access to the Vulnetix Vulnerability Database (VDB) API, offering comprehensive vulnerability intelligence from multiple authoritative sources.

Table of Contents

Overview

The VDB API aggregates vulnerability data from:

  • Primary Sources: MITRE CVE, NIST NVD, CISA KEV
  • Enhanced Intelligence: VulnCheck KEV/NVD++/XDB, CrowdSec
  • Ecosystem Sources: GitHub Security Advisories, OSV, EUVD
  • Risk Scoring: FIRST EPSS, Coalition CESS

Authentication

Environment Variables

The recommended approach is to set environment variables:

export VVD_ORG="your-organization-uuid"
export VVD_SECRET="your-secret-key"

Configuration File

Alternatively, create ~/.vulnetix/vdb.json:

{
  "org_id": "your-organization-uuid",
  "secret_key": "your-secret-key"
}

Command-Line Flags

You can also provide credentials via flags (not recommended for security):

vulnetix vdb ecosystems --org-id "your-uuid" --secret "your-secret"

Obtaining Credentials

  1. Via Demo Request: Visit https://www.vulnetix.com and complete the demo request form
  2. Via Email: Send a request to sales@vulnetix.com with subject “VDB API Access Request”

Supported Identifier Formats

The VDB accepts 78+ vulnerability identifier formats. You are not limited to CVE — any command that takes a <vuln-id> accepts any of these:

Core & Ecosystem

FormatExampleSource
CVECVE-2021-44228MITRE / NIST NVD
GHSAGHSA-jfh8-3a1q-hjz9GitHub Security Advisories
PYSECPYSEC-2024-123PyPI
GOGO-2024-1234Go vulnerability database
RUSTSECRUSTSEC-2024-1234RustSec
EUVDEUVD-2025-14498EU Vulnerability Database
OSVOSV-2024-1234OSV (generic)
GSDGSD-2024-1234Global Security Database
VDBVDB-2025-1Vulnetix Database
GCVEGCVE-VVD-2025-0001Vulnetix-generated CVE

Vendor & Research

FormatExampleSource
SNYKSNYK-JAVA-ORGCLOJURE-5740378Snyk
ZDIZDI-23-1714Trend Micro Zero Day Initiative
MSCVE / MSRCMSCVE-2025-21415Microsoft
RHSARHSA-2025:1730Red Hat Security Advisory
TALOSTALOS-2023-1896Cisco Talos
EDBEDB-10102OffSec Exploit Database
WORDFENCEWORDFENCE-00086b84-...Defiant Wordfence
PATCHSTACKPATCHSTACK/spectrum/wordpress-themePatchstack
MFSAMFSA2024-51Mozilla Foundation
JVNDBJVNDB-2023-006199Japan Vulnerability Notes
CNVDCNVD-2024-02713China National Vulnerability DB
BDUBDU:2024-00390Russian Data Bank
HUNTRHUNTR-001d1c29-...ProtectAI Huntr

Linux Distribution Advisories

FormatExampleSource
DSADSA-4741-1Debian Security Advisory
DLADLA-2931-1Debian LTS Advisory
USNUSN-7040-1Ubuntu Security Notice
ALSAALSA-2019:2722AlmaLinux
RLSARLSA-2024:7346Rocky Linux
MGASAMGASA-2024-0327Mageia
OPENSUSEOPENSUSE-SU-2019:1915-1openSUSE
FreeBSDFreeBSD-SA-00:01.makeFreeBSD
BITBIT-OPENBLAS-2021-4048Bitnami

See vulnetix vdb spec for the complete OpenAPI specification and the full list of accepted identifier patterns.

CLI Commands

vdb vuln

Retrieve detailed information about a specific vulnerability.

Usage:

vulnetix vdb vuln <vuln-id> [flags]

Flags:

  • -o, --output string: Output format (json, pretty) (default “pretty”)

Examples:

# CVE (MITRE / NVD)
vulnetix vdb vuln CVE-2021-44228

# GitHub Security Advisory
vulnetix vdb vuln GHSA-jfh8-3a1q-hjz9

# PyPI vulnerability
vulnetix vdb vuln PYSEC-2024-123

# Red Hat advisory
vulnetix vdb vuln RHSA-2025:1730

# JSON output
vulnetix vdb vuln CVE-2021-44228 --output json

# Save to file
vulnetix vdb vuln CVE-2021-44228 -o json > log4shell.json

Response includes:

  • Vulnerability identifier and aliases
  • Description
  • Published and modified dates
  • CVSS scores (v2, v3, v4 where available)
  • References and advisories
  • Affected products and versions
  • EPSS probability scores
  • KEV (Known Exploited Vulnerabilities) status

vdb ecosystems

List all available package ecosystems in the VDB.

Usage:

vulnetix vdb ecosystems [flags]

Flags:

  • -o, --output string: Output format (json, pretty) (default “pretty”)

Examples:

# List ecosystems
vulnetix vdb ecosystems

# Get ecosystems as JSON
vulnetix vdb ecosystems --output json

Typical ecosystems include:

  • npm (JavaScript/Node.js)
  • PyPI (Python)
  • Maven (Java)
  • Go
  • RubyGems
  • NuGet (.NET)
  • crates.io (Rust)
  • And many more…

vdb product

Get version information for a specific product or package.

Usage:

vulnetix vdb product <product-name> [version] [ecosystem] [flags]

Flags:

  • --limit int: Maximum number of results to return (default 100)
  • --offset int: Number of results to skip (default 0)
  • -o, --output string: Output format (json, pretty) (default “pretty”)

Examples:

# List all versions of a product
vulnetix vdb product express

# Get specific version information
vulnetix vdb product express 4.17.1

# Get specific version scoped to ecosystem
vulnetix vdb product express 4.17.1 npm

# List with pagination
vulnetix vdb product express --limit 50 --offset 100

# Get all versions as JSON
vulnetix vdb product lodash --output json

List response includes:

  • Package/product name
  • Total number of versions
  • Array of version records, each with:
    • version — version string
    • ecosystem — package ecosystem (e.g. npm, PyPI)
    • sources — contributing data sources
  • Pagination information (hasMore, limit, offset)

Specific version response includes:

  • Detailed version metadata
  • Dependencies
  • Known vulnerabilities
  • Release date
  • Maintainer information

vdb vulns

Retrieve all known vulnerabilities for a specific package.

Usage:

vulnetix vdb vulns <package-name> [flags]

Flags:

  • --limit int: Maximum number of results to return (default 100)
  • --offset int: Number of results to skip (default 0)
  • -o, --output string: Output format (json, pretty) (default “pretty”)

Examples:

# Get vulnerabilities for a package
vulnetix vdb vulns express

# Get vulnerabilities with pagination
vulnetix vdb vulns lodash --limit 20

# Get vulnerabilities as JSON
vulnetix vdb vulns moment --output json

# Get next page of results
vulnetix vdb vulns react --offset 100

Response includes:

  • Total vulnerability count
  • Array of vulnerabilities with:
    • Vulnerability identifiers (CVE, GHSA, and other formats)
    • Severity levels
    • CVSS scores
    • Affected version ranges
    • Fixed versions
    • Descriptions
    • References
  • Pagination information

vdb spec

Retrieve the OpenAPI specification for the VDB API.

Usage:

vulnetix vdb spec [flags]

Flags:

  • -o, --output string: Output format (json, pretty) (default “pretty”)

Examples:

# View the API specification
vulnetix vdb spec

# Save specification to file
vulnetix vdb spec --output json > vdb-openapi-spec.json

# Use with other tools
vulnetix vdb spec -o json | jq '.paths'

vdb exploits

Retrieve exploit intelligence for a specific vulnerability.

Usage:

vulnetix vdb exploits <vuln-id> [flags]

Flags:

  • -o, --output string: Output format (json, pretty) (default “pretty”)

Examples:

# CVE
vulnetix vdb exploits CVE-2021-44228

# GitHub Security Advisory
vulnetix vdb exploits GHSA-jfh8-3a1q-hjz9

# JSON output
vulnetix vdb exploits CVE-2021-44228 --output json

Sources include: ExploitDB, Metasploit modules, Nuclei templates, VulnCheck, CrowdSec, and GitHub proof-of-concept repositories.


vdb fixes

Retrieve comprehensive fix data for a specific vulnerability.

Usage:

vulnetix vdb fixes <vuln-id> [flags]

Flags:

  • -o, --output string: Output format (json, pretty) (default “pretty”)

Examples:

# CVE
vulnetix vdb fixes CVE-2021-44228

# GitHub Security Advisory
vulnetix vdb fixes GHSA-jfh8-3a1q-hjz9

# JSON output
vulnetix vdb fixes CVE-2021-44228 --output json

Response includes: Patches, advisories, workarounds, KEV required actions, and AI-generated analysis.


vdb versions

List all known versions for a package across ecosystems.

Usage:

vulnetix vdb versions <package-name> [flags]

Flags:

  • -o, --output string: Output format (json, pretty) (default “pretty”)

Examples:

# Get all versions of a package
vulnetix vdb versions express

# Get versions as JSON
vulnetix vdb versions express --output json

vdb gcve

Retrieve a paginated list of vulnerabilities published within a date range, with enrichment data.

Usage:

vulnetix vdb gcve --start <YYYY-MM-DD> --end <YYYY-MM-DD> [flags]

Flags:

  • --start string: Start date (YYYY-MM-DD) [required]
  • --end string: End date (YYYY-MM-DD) [required]
  • -o, --output string: Output format (json, pretty) (default “pretty”)

Examples:

# Get vulnerabilities published in January 2024
vulnetix vdb gcve --start 2024-01-01 --end 2024-01-31

# Get all 2024 vulnerabilities as JSON
vulnetix vdb gcve --start 2024-01-01 --end 2024-12-31 --output json

# Save to file
vulnetix vdb gcve --start 2024-01-01 --end 2024-01-31 -o json > jan-2024-vulns.json

API-Only Endpoints

The following VDB API endpoints are available via direct HTTP requests but do not yet have dedicated CLI subcommands. Use vulnetix vdb spec to retrieve the full OpenAPI specification.

GET /v1/summary/{year}

Annual vulnerability statistics including severity distribution, top CWEs, affected vendors, and trends.

curl -H "Authorization: Bearer $TOKEN" \
  https://api.vdb.vulnetix.com/v1/summary/2024

Examples

Look Up a Vulnerability by Any Identifier

# MITRE CVE (Log4Shell)
vulnetix vdb vuln CVE-2021-44228

# GitHub Security Advisory (same vulnerability)
vulnetix vdb vuln GHSA-jfh8-3a1q-hjz9

# PyPI vulnerability
vulnetix vdb vuln PYSEC-2024-123

# Rust vulnerability
vulnetix vdb vuln RUSTSEC-2024-1234

# Red Hat advisory
vulnetix vdb vuln RHSA-2025:1730

# Debian security advisory
vulnetix vdb vuln DSA-4741-1

# Ubuntu security notice
vulnetix vdb vuln USN-7040-1

Investigate Exploits and Fixes

# Check exploit intelligence
vulnetix vdb exploits CVE-2021-44228
vulnetix vdb exploits GHSA-jfh8-3a1q-hjz9

# Get available fixes
vulnetix vdb fixes CVE-2021-44228
vulnetix vdb fixes GHSA-jfh8-3a1q-hjz9

Audit Package Vulnerabilities

# Check if Express.js has vulnerabilities
vulnetix vdb vulns express

# Check specific version
vulnetix vdb product express 4.16.0

# Check specific version in npm ecosystem
vulnetix vdb product express 4.16.0 npm

Explore Available Data

# List all ecosystems
vulnetix vdb ecosystems

# Find all versions of a package
vulnetix vdb product react --limit 500

# List all package versions across ecosystems
vulnetix vdb versions react

Export Data for Analysis

# Export vulnerability data (any identifier format)
vulnetix vdb vuln CVE-2021-44228 -o json > analysis/log4shell-cve.json
vulnetix vdb vuln GHSA-jfh8-3a1q-hjz9 -o json > analysis/log4shell-ghsa.json

# Export all vulnerabilities for a package
vulnetix vdb vulns webpack -o json > reports/webpack-vulns.json

# Export API specification
vulnetix vdb spec -o json > docs/vdb-api-spec.json

# Export vulnerabilities for a date range
vulnetix vdb gcve --start 2024-01-01 --end 2024-01-31 -o json > jan-2024-vulns.json

Combine with Other Tools

# Filter vulnerability data with jq
vulnetix vdb vuln CVE-2021-44228 -o json | jq '.[0].containers.cna.title'

# Count vulnerabilities
vulnetix vdb vulns lodash -o json | jq '.total'

# Extract severity levels
vulnetix vdb vulns express -o json | jq '.vulnerabilities[].severity' | sort | uniq -c

Rate Limiting

The VDB API implements rate limiting to ensure fair usage:

Per-Minute Rate Limit

  • Default: 60 requests per minute
  • Exceeded requests receive HTTP 429 status

Weekly Quota

  • Default: 1000 requests per week (configurable per organization)
  • Resets every Sunday at 00:00 UTC
  • Contact sales@vulnetix.com for higher quotas

Rate Limit Headers

All responses include rate limit information:

RateLimit-MinuteLimit: 60
RateLimit-Remaining: 45
RateLimit-Reset: 28
RateLimit-WeekLimit: 10000
RateLimit-WeekRemaining: 8543
RateLimit-WeekReset: 172800

Handling Rate Limits

The CLI automatically handles token expiration (15-minute JWT tokens).

For rate limit errors, the API returns:

{
  "success": false,
  "error": "Rate limit exceeded",
  "details": "Too many requests. Limit: 60 requests per minute. Try again in 42 seconds."
}

Best Practices:

  • Cache responses when possible
  • Use pagination parameters to reduce request count
  • Implement exponential backoff for retries
  • Monitor rate limit headers
  • Contact Vulnetix for production usage quotas

Global Flags

All vdb commands support these global flags:

  • --org-id string: Organization UUID (overrides VVD_ORG env var)
  • --secret string: Secret key (overrides VVD_SECRET env var)
  • --base-url string: VDB API base URL (default “https://api.vdb.vulnetix.com/v1")
  • -o, --output string: Output format (json, pretty) (default “pretty”)

Security Notes

  1. Never commit credentials to version control
  2. Use environment variables or secure configuration files
  3. Rotate secrets regularly for production use
  4. Store secrets securely using secrets managers in CI/CD
  5. Limit access to credentials on shared systems

Troubleshooting

Authentication Errors

# Error: credentials not found
# Solution: Set environment variables
export VVD_ORG="your-uuid"
export VVD_SECRET="your-secret"

# Or create config file
mkdir -p ~/.vulnetix
cat > ~/.vulnetix/vdb.json << EOF
{
  "org_id": "your-uuid",
  "secret_key": "your-secret"
}
EOF

Token Expiration

JWT tokens automatically expire after 15 minutes. The CLI handles token refresh automatically. If you encounter token errors, try:

# The CLI will automatically request a new token
vulnetix vdb ecosystems

Rate Limiting

If you exceed rate limits:

  1. Wait for the reset time indicated in the error message
  2. Consider implementing caching
  3. Use pagination to reduce request frequency
  4. Contact Vulnetix for higher quotas

Network Issues

# Test connectivity
curl -I https://api.vdb.vulnetix.com/v1/spec

# Use custom base URL if needed
vulnetix vdb ecosystems --base-url https://custom-endpoint.example.com/v1

API Documentation

For complete API documentation, visit:

Support

For assistance: