CVE-Search
About
Access vulnerability data from the Common Vulnerabilities and Exposures (CVE) database seamlessly by leveraging the connectivity with the CVE-CIRCL API. Ideal for security assessments, patch validations, and in-depth security research.
Explore Similar MCP Servers
Security Infrastructure
Enhance your SOC operations with seamless integration with Splunk SIEM, CrowdStrike EDR, and Microsoft MISP. Empower cross-platform threat hunting, security event searches, detection retrieval, and access to threat intelligence queries.
OpenCTI
Enhance your cyber threat intelligence operations by seamlessly connecting to OpenCTI through the Model Context Protocol (MCP). This integration empowers automated analysis, manipulation, and enrichment of threat data, boosting the efficiency of your security processes.
ExploitDB
Discover the full potential of cybersecurity research with seamless access to ExploitDB features through the Model Context Protocol (MCP). Conduct targeted exploit queries based on keywords, CVE IDs, or platforms while benefiting from local database caching to enhance threat intelligence and vulnerability analysis.
CyberMCP (API Security Testing)
Enhance your API security with cutting-edge tools for verifying authentication, detecting SQL injections, analyzing data leaks, and scanning for vulnerabilities. Receive comprehensive severity ratings and expert guidance on remediation strategies.
Vulnerability Intelligence
Empower security experts with advanced tools for analyzing vulnerabilities, including CVE search, CVSS scoring, exploit verification, and incident timeline monitoring, leveraging the National Vulnerability Database for curated data.
Shodan
Discover insights on IoT device data and vulnerabilities by leveraging the Shodan API and CVEDB.
Solodit
Explore a cutting-edge Model Context Protocol (MCP) that seamlessly interacts with Solodit's robust vulnerability repository, enabling swift access to comprehensive smart contract security audit results. Uncover detailed vulnerability assessments that encompass impact severity, audit agency particulars, and in-depth technical insights crucial for conducting thorough security evaluations and analyses.
NVD (National Vulnerability Database)
Gain entry to the NIST National Vulnerability Database using specialized tools like get_cve and search_cve. These tools enable users to retrieve and explore CVE entries with flexible search parameters for tailored results.
Trivy Security Scanner
Enhance your project security with seamless integration to Trivy, enabling automated vulnerability checks and fixes for diverse programming languages and package management systems.
Nuclei
Automate security evaluations by integrating seamlessly with the Nuclei vulnerability scanner. Tailor scanning operations as needed, generating detailed reports to analyze vulnerabilities and facilitate effective remediation efforts.
ZeroPath
Employs seamless integration with the ZeroPath vulnerability management tool, facilitating search, retrieval of comprehensive security issue details, and patch approval via secure API communication.
OSV Database API
Discover security flaws in software packages by connecting to the OSV Database API. Access CVE details, determine impacted versions, and find solutions.
NVD (National Vulnerability Database)
Gain immediate access to the National Vulnerability Database (NVD) through the Model Context Protocol (MCP) to retrieve comprehensive CVE details such as descriptions, severity rankings, release dates, and citations based on unique identifiers.
OSV Vulnerability Database
Access comprehensive security insights by connecting to the Open Source Vulnerabilities (OSV) database. Conduct detailed vulnerability searches based on package versions, commits, or IDs to enhance security assessments and analyze software compositions effectively.