cve-mcp-server
MCP ServerFreeProduction-grade MCP server giving Claude 27 security intelligence tools across 21 APIs — CVE lookup, EPSS scoring, CISA KEV, MITRE ATT&CK, Shodan, VirusTotal, and more.
Capabilities19 decomposed
cve database lookup with multi-source aggregation
Medium confidenceQueries CVE records across NVD, OSV, and GitHub Advisory databases simultaneously, aggregating vulnerability metadata (CVSS scores, descriptions, affected versions, patch status) into unified response objects. Implements parallel API calls with fallback routing when primary sources are unavailable, returning structured vulnerability intelligence with source attribution for audit trails.
Implements transparent multi-source aggregation with source attribution and fallback routing, allowing Claude to cross-reference CVE data across NVD, OSV, and GitHub simultaneously rather than querying single sources sequentially
Provides richer vulnerability context than single-API tools like CVE Details or NVD direct queries by aggregating patch status, advisory links, and ecosystem-specific metadata in parallel
epss severity scoring and percentile ranking
Medium confidenceIntegrates FIRST's Exploit Prediction Scoring System (EPSS) API to compute exploit likelihood percentiles for CVEs, translating raw CVSS scores into real-world exploitability predictions. Returns percentile rankings (0-100) indicating the probability a vulnerability will be exploited in the wild, enabling risk-based prioritization of remediation efforts over pure severity metrics.
Exposes EPSS percentile rankings directly to Claude's reasoning engine, enabling LLM-driven risk prioritization logic that can compare exploit likelihood across vulnerability portfolios and recommend patching strategies based on exploitability rather than severity alone
Provides exploit prediction scoring that CVSS alone cannot offer; CVSS measures severity while EPSS measures likelihood of real-world exploitation, giving security teams a critical missing dimension for prioritization
real-time vulnerability feed subscription and alerting
Medium confidenceMonitors vulnerability feeds (NVD, CISA KEV, OSV, vendor advisories) for new disclosures matching specified criteria (affected products, severity thresholds, threat actor attribution). Implements filtering and deduplication logic to reduce alert fatigue, delivering structured notifications with context (impact assessment, remediation guidance, affected asset count) to configured channels (email, Slack, webhook).
Implements real-time monitoring of multiple vulnerability feeds with intelligent filtering and deduplication, enabling Claude to proactively alert on emerging threats matching organizational criteria rather than requiring manual feed monitoring
Real-time feed monitoring provides early warning of emerging threats that periodic vulnerability scans cannot match; intelligent filtering reduces alert fatigue compared to raw feed subscriptions
threat actor and campaign attribution linking
Medium confidenceCorrelates vulnerability data with threat actor profiles, known attack campaigns, and malware families using MITRE ATT&CK, VirusTotal, and threat intelligence feeds. Maps CVEs to specific threat groups (e.g., APT28, Lazarus) known to exploit them, enabling threat-driven vulnerability prioritization and incident correlation. Implements entity linking to connect disparate threat intelligence sources into coherent threat profiles.
Enables Claude to correlate vulnerabilities with specific threat actors and campaigns by linking MITRE ATT&CK, VirusTotal, and threat intelligence sources, transforming vulnerability data into adversary-centric threat profiles
Threat actor attribution provides context that vulnerability databases alone cannot offer; linking CVEs to known threat groups enables prioritization based on adversary sophistication and targeting patterns rather than generic severity metrics
mcp protocol integration and tool registration
Medium confidenceImplements the Model Context Protocol (MCP) server specification, exposing all 27 security tools as callable functions with standardized JSON-RPC interfaces. Handles request routing, parameter validation, error handling, and response serialization according to MCP specification. Enables seamless integration with Claude and other MCP-compatible clients through automatic tool discovery and schema advertisement.
Implements full MCP server specification exposing 27 security tools as standardized callable functions, enabling Claude to invoke security capabilities directly without custom integration code
MCP protocol provides standardized tool integration that custom API wrappers cannot match; enables tool discovery, schema advertisement, and compatibility with multiple LLM clients
api credential management and multi-provider support
Medium confidenceImplements secure credential management for 21+ external APIs (NVD, EPSS, CISA KEV, Shodan, VirusTotal, etc.) with support for environment variables, configuration files, and secure credential stores. Handles API key rotation, rate limit tracking, and provider failover logic. Enables seamless switching between API providers (e.g., multiple VirusTotal API keys for rate limit distribution) without code changes.
Implements centralized credential management for 21+ APIs with support for environment variables, config files, and secure stores, enabling secure deployment without hardcoded keys or manual credential handling
Centralized credential management reduces security risk compared to scattered API key management; multi-provider support enables rate limit distribution and failover that single-provider tools cannot offer
error handling and graceful degradation with fallback routing
Medium confidenceImplements comprehensive error handling with automatic fallback routing when primary data sources are unavailable. Catches API failures, rate limits, timeouts, and malformed responses, routing requests to alternative providers or returning cached/partial results. Provides detailed error context to clients enabling informed decision-making when data is incomplete or unavailable.
Implements intelligent fallback routing across multiple data sources with graceful degradation, enabling continued operation when primary APIs are unavailable rather than complete tool failure
Fallback routing provides resilience that single-source tools cannot match; enables continued operation during API outages or rate limiting by transparently routing to alternative providers
structured data extraction and schema-based output formatting
Medium confidenceImplements schema-based output formatting for all tool responses, ensuring consistent JSON structure across 27 different APIs with varying response formats. Parses and normalizes heterogeneous API responses into unified data models (e.g., all vulnerability records conform to a standard schema regardless of source). Enables reliable downstream processing by Claude and other clients through guaranteed output structure.
Normalizes responses from 21+ heterogeneous APIs into unified JSON schemas, enabling reliable downstream processing and consistent output format across all security tools
Schema normalization provides data consistency that raw API responses cannot offer; unified output format enables reliable parsing and downstream automation without provider-specific handling
caching and response memoization for performance optimization
Medium confidenceImplements intelligent caching of API responses with configurable TTLs (time-to-live) based on data volatility. Caches stable data (CVE descriptions, MITRE ATT&CK mappings) with long TTLs (24+ hours), while caching volatile data (EPSS scores, CISA KEV status) with short TTLs (1-4 hours). Reduces API calls and latency for repeated queries, enabling faster response times and lower API quota consumption.
Implements intelligent caching with data-type-specific TTLs, caching stable data (CVE descriptions) long-term while keeping volatile data (EPSS scores) fresh, optimizing both performance and data freshness
Intelligent caching with data-type-specific TTLs provides better performance than no caching while maintaining data freshness better than fixed-TTL approaches; reduces API quota consumption for repeated queries
logging, audit trails, and compliance documentation
Medium confidenceImplements comprehensive logging of all API calls, tool invocations, and results with structured logging format (JSON) suitable for log aggregation and analysis. Maintains audit trails showing who queried what data, when, and what results were returned. Enables compliance documentation for regulatory requirements (HIPAA, SOC 2, PCI-DSS) by providing detailed records of security tool usage and data access.
Implements structured JSON logging with automatic audit trails for all tool invocations, enabling compliance documentation and forensic analysis of security tool usage
Structured logging with audit trails provides compliance-grade documentation that unstructured logs cannot match; enables forensic analysis and regulatory compliance without manual record-keeping
documentation and tool discovery
Medium confidenceProvides auto-generated documentation for all 27 tools including parameter descriptions, example invocations, and expected outputs. Implements tool discovery endpoint that Claude can query to understand available tools and their capabilities. Supports both human-readable documentation (Markdown) and machine-readable schemas (JSON Schema).
Implements auto-generated documentation from code with tool discovery endpoint; provides both human-readable (Markdown) and machine-readable (JSON Schema) formats
More maintainable than manual documentation because it's auto-generated; more discoverable than static docs because it provides tool discovery endpoint
cisa known exploited vulnerabilities (kev) catalog search
Medium confidenceQueries CISA's authoritative KEV catalog of vulnerabilities with confirmed active exploitation in the wild, returning structured records of vulnerability IDs, exploit availability, due dates for federal agency patching, and threat actor attribution when available. Implements real-time filtering against the continuously updated CISA KEV dataset to identify which vulnerabilities in a portfolio have documented exploits.
Provides direct integration with CISA's authoritative KEV catalog, which is the only government-maintained list of vulnerabilities with confirmed active exploitation; enables Claude to distinguish between theoretical and real-world threats and enforce federal compliance deadlines
CISA KEV is the authoritative source for active exploitation confirmation; unlike vendor-specific vulnerability databases, it aggregates exploitation data across all software and provides legally-binding due dates for federal contractors
mitre att&ck framework mapping and tactic correlation
Medium confidenceMaps CVEs and vulnerabilities to MITRE ATT&CK tactics, techniques, and sub-techniques, enabling threat modeling by linking exploits to adversary behavior patterns. Queries the MITRE ATT&CK knowledge base to return structured technique IDs, tactic categories (e.g., Initial Access, Privilege Escalation), and associated threat groups known to use specific attack chains, facilitating threat-driven vulnerability prioritization.
Bridges vulnerability data with MITRE ATT&CK framework by mapping CVEs to specific tactics and techniques, enabling Claude to reason about vulnerabilities in the context of adversary behavior patterns rather than in isolation
Provides threat-centric vulnerability analysis that pure CVE databases cannot offer; MITRE ATT&CK mapping transforms vulnerability lists into adversary capability assessments, enabling defense-in-depth strategies aligned with known threat behaviors
shodan iot and exposed service reconnaissance
Medium confidenceIntegrates Shodan API to search for internet-exposed devices, services, and infrastructure matching specified criteria (IP ranges, ports, banners, hostnames). Returns structured results including device metadata (OS, service version, geolocation), vulnerability indicators, and exposure risk scores. Enables reconnaissance of attack surface by identifying which systems running vulnerable software are publicly accessible.
Provides direct Shodan API integration enabling Claude to perform internet-wide reconnaissance for vulnerable services, translating CVE data into real-world exposure assessment by identifying which vulnerable systems are publicly accessible
Shodan is the only search engine indexing internet-exposed services at scale; unlike port scanners limited to specific IP ranges, Shodan enables global reconnaissance of vulnerable infrastructure and discovery of unexpected exposures
virustotal malware and threat intelligence correlation
Medium confidenceQueries VirusTotal API to check files, URLs, and IP addresses against 90+ antivirus engines and threat intelligence sources, returning detection ratios, malware family classifications, and behavioral analysis results. Enables correlation of vulnerability exploits with known malware payloads, identifying which CVEs are actively weaponized and distributed in the wild.
Integrates VirusTotal's 90+ antivirus engine network to correlate CVE exploits with weaponized malware, enabling Claude to assess not just vulnerability existence but active exploitation and malware distribution in the wild
VirusTotal aggregates detections from 90+ antivirus engines and threat intelligence sources, providing consensus-based malware detection that single-vendor solutions cannot match; enables correlation of CVEs with known malware families
nvd vulnerability database full-text search and filtering
Medium confidenceImplements direct querying of the National Vulnerability Database (NVD) with support for complex filtering by CVE ID, CWE (Common Weakness Enumeration), CVSS score ranges, publication date ranges, and affected product/vendor combinations. Returns paginated results with complete vulnerability records including descriptions, references, and configuration data, enabling comprehensive vulnerability research and portfolio analysis.
Provides direct NVD API integration with complex filtering capabilities (CWE, CVSS ranges, date ranges, product combinations) enabling Claude to perform sophisticated vulnerability research and portfolio analysis without manual database queries
NVD is the authoritative US government vulnerability database; direct API access enables programmatic research at scale, whereas manual NVD web searches are limited to simple queries and cannot be automated
osv (open source vulnerabilities) ecosystem-specific lookup
Medium confidenceQueries the OSV database (maintained by Google and the Linux Foundation) for vulnerabilities in open-source packages across multiple ecosystems (npm, PyPI, Maven, Cargo, Go, Pub, NuGet, RubyGems). Returns ecosystem-specific metadata including affected version ranges, patch availability, and ecosystem-native advisory links. Enables rapid identification of vulnerable dependencies in software supply chains.
Provides ecosystem-aware vulnerability lookup across 8+ package managers (npm, PyPI, Maven, Cargo, Go, Pub, NuGet, RubyGems) with version-range matching, enabling Claude to identify safe upgrade paths and supply chain risks in polyglot environments
OSV is the only unified vulnerability database spanning multiple open-source ecosystems; unlike NVD which focuses on CVEs, OSV includes ecosystem-specific advisories and version-range matching critical for dependency management
vulnerability impact assessment and remediation guidance
Medium confidenceSynthesizes vulnerability data from multiple sources (CVE, CVSS, EPSS, CISA KEV, MITRE ATT&CK) to generate structured impact assessments and remediation recommendations. Analyzes vulnerability characteristics (exploitability, affected systems, patch availability, workarounds) to produce prioritized remediation guidance tailored to organizational context (industry, asset inventory, compliance requirements).
Synthesizes vulnerability data from 6+ sources (CVE, CVSS, EPSS, CISA KEV, MITRE ATT&CK, Shodan, VirusTotal) into unified impact assessments and remediation recommendations, enabling Claude to reason about vulnerabilities holistically rather than in isolation
Provides integrated risk assessment that single-source tools cannot offer; by combining exploitability (EPSS), active exploitation (CISA KEV), threat context (MITRE ATT&CK), and exposure data (Shodan), enables more accurate prioritization than CVSS-only approaches
batch vulnerability portfolio analysis and reporting
Medium confidenceProcesses lists of CVE IDs, package names, or IP addresses in bulk to generate comprehensive vulnerability portfolio reports. Implements parallel processing of multiple queries with aggregation of results into summary statistics (total vulnerabilities, severity distribution, exploitability trends, remediation recommendations). Outputs structured reports suitable for executive briefings, compliance documentation, or automated SLA tracking.
Implements parallel batch processing of vulnerability data across multiple sources with aggregation into portfolio-level insights, enabling Claude to analyze entire vulnerability inventories and generate compliance reports without manual data compilation
Batch processing enables portfolio-level analysis that manual CVE lookups cannot provide; aggregation of statistics and trends across hundreds or thousands of vulnerabilities enables data-driven decision making at scale
Capabilities are decomposed by AI analysis. Each maps to specific user intents and improves with match feedback.
Related Artifactssharing capabilities
Artifacts that share capabilities with cve-mcp-server, ranked by overlap. Discovered automatically through the match graph.
OSV
** - Access the [OSV (Open Source Vulnerabilities) database](https://osv.dev/) for vulnerability information. Query vulnerabilities by package version or commit, batch query multiple packages, and get detailed vulnerability information by ID.
VulnCheck
Real-time cyber threat intelligence, proactive vulnerability...
Cyclops Security
AI-driven, integrates, prioritizes cybersecurity risks...
EMA MCP Security Auditor v3.1.0
Audits any MCP server for command injection, path traversal, missing auth, hardcoded secrets, SQL injection, SSRF and tool poisoning. Returns grade A-F with CVE references. Malicious servers flagged network-wide after audit. Now with shared learning brain.
Mend.io
AI-powered application security with auto-remediation.
MCPWatch
** - A comprehensive security scanner for Model Context Protocol (MCP) servers that detects vulnerabilities and security issues in your MCP server implementations.
Best For
- ✓Security engineers performing rapid vulnerability triage during incident response
- ✓DevSecOps teams automating dependency scanning in CI/CD pipelines
- ✓Threat intelligence analysts building comprehensive vulnerability profiles
- ✓Security teams with limited patching capacity needing data-driven prioritization
- ✓Vulnerability management platforms integrating risk scoring into SLAs
- ✓Threat hunters correlating EPSS scores with observed exploit activity
- ✓Security operations centers (SOCs) monitoring for emerging threats
- ✓Incident response teams tracking active exploitation campaigns
Known Limitations
- ⚠API rate limits on NVD (120 requests/minute) and OSV may cause throttling during bulk queries of 100+ CVEs
- ⚠Aggregation latency adds 500-1500ms per query due to parallel source polling
- ⚠Some older CVEs (pre-2005) have incomplete metadata across sources
- ⚠EPSS scores update daily; real-time scores may lag actual exploit activity by 24-48 hours
- ⚠Percentile rankings are relative to all CVEs in the dataset, not absolute exploit probability
- ⚠Coverage limited to CVEs published after 2010; older vulnerabilities lack EPSS data
Requirements
Input / Output
UnfragileRank
UnfragileRank is computed from adoption signals, documentation quality, ecosystem connectivity, match graph feedback, and freshness. No artifact can pay for a higher rank.
Repository Details
Last commit: May 2, 2026
About
Production-grade MCP server giving Claude 27 security intelligence tools across 21 APIs — CVE lookup, EPSS scoring, CISA KEV, MITRE ATT&CK, Shodan, VirusTotal, and more.
Categories
Alternatives to cve-mcp-server
Search the Supabase docs for up-to-date guidance and troubleshoot errors quickly. Manage organizations, projects, databases, and Edge Functions, including migrations, SQL, logs, advisors, keys, and type generation, in one flow. Create and manage development branches to iterate safely, confirm costs
Compare →Are you the builder of cve-mcp-server?
Claim this artifact to get a verified badge, access match analytics, see which intents users search for, and manage your listing.
Get the weekly brief
New tools, rising stars, and what's actually worth your time. No spam.
Data Sources
Looking for something else?
Search →