Loading...

This MCP server provides access to CVE-Search API, enabling users to query vulnerability information, vendor/product details, and database statistics.
Boost this tool
Subscribe to listing upgrades or segmented pushes.
This MCP server provides access to CVE-Search API, enabling users to query vulnerability information, vendor/product details, and database statistics.
This MCP server is generally safe due to its read-only nature and reliance on a well-established vulnerability database. Risks are primarily associated with the security and availability of the CVE-Search API itself. It is safe to use for querying vulnerability information but keep in mind the limitations of a third-party API.
Performance is dependent on the CVE-Search API's response times. Consider caching results if possible to reduce API calls.
There are no direct costs associated with this MCP server, but excessive API calls may be subject to rate limiting by CVE-Search.
get_vendorsRetrieves a JSON list of all vendors in the CVE database.
Read-only operation, no modification of data.
get_products_by_vendorRetrieves a JSON list of products associated with a specific vendor.
Read-only operation, no modification of data.
get_vulnerabilities_by_vendor_productRetrieves a JSON list of vulnerabilities for a specific vendor and product.
Read-only operation, no modification of data.
get_cve_by_idRetrieves a JSON representation of a specific CVE ID.
Read-only operation, no modification of data.
get_last_30_cvesRetrieves a JSON list of the last 30 CVEs, including CAPEC, CWE, and CPE expansions.
Read-only operation, no modification of data.
get_database_infoRetrieves a JSON with information about the current databases in use and when they were last updated.
Read-only operation, no modification of data.
None
cloud
This MCP server is generally safe due to its read-only nature and reliance on a well-established vulnerability database. Risks are primarily associated with the security and availability of the CVE-Search API itself. It is safe to use for querying vulnerability information but keep in mind the limitations of a third-party API.
The server operates in read-only mode, limiting the scope for autonomous actions. Sandboxing is provided by the client environment.
Production Tip
Monitor the CVE-Search API for availability and rate limits to ensure consistent performance.
CVE-Search is a vulnerability database that aggregates information from various sources, providing a comprehensive view of known vulnerabilities.
Yes, this MCP server is free to use, but it relies on the CVE-Search API, which may have its own usage policies.
The CVE data is updated regularly, but the frequency depends on the CVE-Search project. Use the `get_database_info` tool to check the last update time.
No authentication is required to use this MCP server, as it accesses a public API.
No, this server only provides information about vulnerabilities. It does not have the capability to patch them.
If the CVE-Search API is unavailable, this MCP server will not be able to retrieve vulnerability information.
You can contribute by submitting bug reports, feature requests, or pull requests on the GitHub repository.