cve-search_mcp
by roadwy·★ 100·Score 44
An MCP server providing secure access to CVE-Search API for vulnerability information lookup.
Overview
This MCP server serves as a bridge between AI assistants and the CVE-Search API, enabling comprehensive vulnerability database access. It supports querying vendors, products, specific CVE IDs, and recent vulnerabilities with CAPEC, CWE, and CPE expansions. The server implements proper MCP protocol structure, making it compatible with various AI clients like Cline and Roo Code. The code is written in Python using modern dependency management with uv, indicating good development practices.
Try asking AI
After installing, here are 5 things you can ask your AI assistant:
When to choose this
Choose this server when building security-focused AI assistants or developer tools that need vulnerability data integration.
When NOT to choose this
Don't choose this if you need write access to vulnerability databases or require real-time alerting beyond what the CVE-Search API provides.
Tools this server exposes
6 tools extracted from the READMEget_vendorsGet a JSON with all the vendors
get_productsGet a JSON with all the products associated to a vendor
get_vulnerabilitiesGet a JSON with all the vulnerabilities per vendor and a specific product
get_cve_by_idGet a JSON of a specific CVE ID
get_last_cvesGet a JSON of the last 30 CVEs including CAPEC, CWE and CPE expansions
get_database_infoGet more information about the current databases in use and when it was updated
Comparable tools
Installation
Installation
- Clone the repository:
git clone https://github.com/roadwy/cve-search_mcp.git
cd cve-search_mcp- Install dependencies:
uv sync- Add to your MCP client configuration:
{
"cve-search_mcp": {
"command": "uv",
"args": [
"--directory",
"YOUR_CVE_SEARCH_MCP_DIR_PATH",
"run",
"main.py"
],
"disabled": false,
"autoApprove": []
}
}For Claude Desktop, add this to your claude_desktop_config.json:
{
"mcpServers": {
"cve-search": {
"command": "uv",
"args": [
"--directory",
"/path/to/cve-search_mcp",
"run",
"main.py"
]
}
}
}FAQ
- What data sources does this MCP server use?
- The server queries the CVE-Search API, which provides access to the CVE (Common Vulnerabilities and Exposures) database maintained by MITRE.
- Can I get vulnerability information for specific vendors and products?
- Yes, the server provides tools to get all vendors, all products associated with a vendor, and vulnerabilities per vendor and product.
Compare cve-search_mcp with
Last updated · Auto-generated from public README + GitHub signals.