Fire in da houseTop Tip:Paying $100+ per month for Perplexity, MidJourney, Runway, ChatGPT and other tools is crazy - get all your AI tools in one site starting at $15 per month with Galaxy AI Fire in da houseCheck it out free

cve-search_mcp

MCP.Pizza Chef: roadwy

The cve-search_mcp is a Model Context Protocol (MCP) server that interfaces with the CVE-Search API, enabling real-time querying of vulnerability data. It provides structured access to comprehensive CVE information including vendors, products, specific CVE details, and the latest updates. This server supports security workflows by delivering detailed vulnerability context directly to LLMs and applications.

Use This MCP server To

Query CVE details by CVE-ID for security analysis Retrieve all vendors from the CVE-Search database List products associated with a specific vendor Fetch vulnerabilities for a given vendor and product Get the latest updated CVEs for real-time threat monitoring Integrate CVE data into security incident response workflows Automate vulnerability scanning reports with up-to-date CVE info

README

MseeP.ai Security Assessment Badge

CVE-Search MCP Server


CVE-SEARCH_MCP

cve-search_mcp MCP server

A Model Context Protocol (MCP) server for querying the CVE-Search API. This server provides comprehensive access to CVE-Search, browse vendor and product、get CVE per CVE-ID、get the last updated CVEs.

Requirements

  • python 3.10+
  • uv
  • Cline、Roo Code etc

Tools

  • To get a JSON with all the vendors
  • To get a JSON with all the products associated to a vendor
  • To get a JSON with all the vulnerabilities per vendor and a specific product
  • To get a JSON of a specific CVE ID
  • To get a JSON of the last 30 CVEs including CAPEC, CWE and CPE expansions
  • To get more information about the current databases in use and when it was updated

Quick Start

  1. Git clone this repository
git clone https://github.com/roadwy/cve-search_mcp.git
  1. Install the dependencies
cd cve-search_mcp
uv sync

3.Add to your mcp client(vscode with cline/roo code) configuration file, modify the "YOU_CVE_SEARCH_MCP_DIR_PATH" as you self dir.

    "cve-search_mcp": {
      "command": "uv",
      "args": [
        "--directory",
        "YOU_CVE_SEARCH_MCP_DIR_PATH",
        "run",
        "main.py"
      ],
      "disabled": false,
      "autoApprove": []
    }

Reference

https://github.com/cve-search/cve-search

cve-search_mcp FAQ

How do I install the cve-search_mcp server?
Install Python 3.10+, then use pip to install dependencies like uv and run the server as per the GitHub instructions.
Can cve-search_mcp provide real-time CVE updates?
Yes, it can fetch the latest updated CVEs from the CVE-Search API for timely vulnerability information.
What data formats does cve-search_mcp return?
It returns data in structured JSON format suitable for integration with LLMs and security tools.
Is authentication required to use the CVE-Search API via cve-search_mcp?
The CVE-Search API is generally open, so no authentication is required for basic queries through this server.
Can I query vulnerabilities by vendor and product?
Yes, the server supports querying all vulnerabilities associated with a specific vendor and product combination.
Does cve-search_mcp support filtering CVEs by date or severity?
The server provides access to CVE data including last updated CVEs, but filtering by severity depends on the CVE-Search API capabilities.
How does cve-search_mcp integrate with LLMs?
It exposes CVE data in a structured format that MCP clients can feed into LLMs for enhanced security context and reasoning.
What are the system requirements for running cve-search_mcp?
Requires Python 3.10 or higher and dependencies like uv; compatible with common MCP host environments.