Security

Vulnerability Intelligence MCP Server

Use Studio chat to drive this server — credentials stay in your workspace.

Cross-source cybersecurity vulnerability intelligence combining NIST NVD CVE data, CISA Known Exploited Vulnerabilities, and EPSS exploit probability scores into unified risk assessments. Essential for security teams and AI-assisted vulnerability triage workflows.

30 tools
No auth required or API Key
Start Chatting

Opens MCPBundles Studio with this server selected. After sign-in, chat and run tools from the same thread.

Browse all tools

Tools in this Server (30)

Cve By Cpe

Find CVEs affecting a specific product using its exact CPE name from the NVD database. CPE format: cpe:2.3:part:vendor:product:version:*:*:*:*:*:*:* w...

Cve By Severity

Search the NIST NVD for CVEs by CVSS v3 severity (LOW, MEDIUM, HIGH, CRITICAL) with optional keyword and recency filters. Use keyword_search to narrow...

Cve By Weakness

Search the NIST NVD for CVEs by CWE weakness type with optional severity and recency filters. Common CWE IDs: CWE-79 (XSS), CWE-89 (SQL Injection), CW...

Cve History

Get the complete change history for a specific CVE from the NIST NVD. Shows when and how the CVE was modified — including analysis updates, CVSS chang...

Cve Kev

Get CVEs in the CISA KEV catalog with full NVD CVSS scoring details. These are actively exploited vulnerabilities federal agencies must remediate. Use...

Cve Lookup

Look up a specific CVE by its ID from the NIST National Vulnerability Database. Returns full details including CVSS scores, description, affected prod...

Cve Recent

Get recently published or modified CVEs from the NIST NVD. Defaults to the last 7 days of modified CVEs. Use pub_or_mod to switch between filtering by...

Cve Search

Search the NIST NVD for CVEs by keyword with optional severity and recency filters. Combine keyword + cvss_v3_severity + days_back for targeted querie...

Cwe Breakdown

Get a frequency breakdown of weakness types (CWEs) across all CISA KEV entries. Shows which vulnerability classes are most commonly exploited in the w...

Due Soon

Find CISA KEV entries with past-due or upcoming federal remediation deadlines. Overdue entries represent federally mandated patches that haven't been ...

Lookup

Look up a specific CVE in the CISA Known Exploited Vulnerabilities catalog. Returns full KEV entry details including the required remediation action, ...

Manage Stack

Manage your technology stack profile. The server remembers what you run and flags CVEs that affect your technologies in every response. Actions: add (...

Manage Watchlist

Manage your CVE watchlist. The server tracks EPSS score changes and KEV status for watched CVEs and reports deltas in every lookup and briefing. Actio...

Most Exploitable

Discover the most exploitable CVEs by EPSS score. Filter by minimum/maximum exploit probability to find vulnerabilities most likely to be exploited in...

Product Exposure

Get a KEV exposure breakdown for a specific vendor — how many actively exploited vulnerabilities affect each of their products, and which products hav...

Ransomware

Get CISA KEV entries that are linked to known ransomware campaigns. These are the highest-priority vulnerabilities — actively exploited AND used by ra...

Recent

Get the most recently added vulnerabilities to the CISA KEV catalog. Results are sorted newest-first. Use days_back to control the lookback window. Cr...

Risk Report

Generate a threat landscape report showing how many CVEs fall into each EPSS risk band (CRITICAL/HIGH/MEDIUM/LOW). Provides total counts at each thres...

Scan Triage

Triage scanner output — paste Trivy JSON, Grype JSON, CSV, or any text containing CVE IDs. Extracts all CVE IDs, queries NVD + CISA KEV + EPSS for eac...

Score At Date

Get the EPSS exploit prediction score for a CVE at a specific historical date. Useful for understanding how exploit risk has evolved, or for retrospec...

Score By Percentile

Find CVEs by EPSS percentile ranking. The percentile shows where a CVE ranks relative to all other scored CVEs. A percentile of 0.99 means the CVE has...

Score History

Get the 30-day EPSS score trend for a specific CVE. Shows how the exploit prediction probability has changed over the past month. Useful for identifyi...

Score Lookup

Look up EPSS exploit prediction scores for one or more CVEs. Returns the probability (0-1) that each CVE will be exploited in the wild within 30 days,...

Search

Search the EPSS database by CVE ID pattern. Find all scored CVEs matching a text pattern — useful for year-based analysis (e.g., 'CVE-2025'), vendor-r...

Search

Search the CISA KEV catalog by vendor, product, vulnerability name, or keyword. Case-insensitive full-text search across all fields. Use ransomware_on...

Stats

Get a summary of the CISA Known Exploited Vulnerabilities catalog: total count, catalog version, date released, how many were added in the last 7/30/9...

Triage

Check a list of CVEs from a vulnerability scan against the CISA KEV catalog. Returns which CVEs are confirmed actively exploited (in KEV), which are n...

Triage

Triage a list of CVEs from a vulnerability scan by exploit probability. Pass in CVE IDs from a scan report and get back a prioritized remediation plan...

Vulnerability Analyze

Full cross-source vulnerability analysis: NVD CVE details + EPSS exploit probability + CISA KEV status + composite risk score. Fetches all three sourc...

Vulnerability App

Open the interactive Vulnerability Intelligence dashboard. Shows CVE details, EPSS exploit probability scores, CISA KEV status, and composite risk ass...

Required Providers (3)

CISA KEV

Security & Auth
The CISA Known Exploited Vulnerabilities (KEV) Catalog is the authoritative U.S. government list of vulnerabilities...
Tools
9 tools

NIST NVD

Security & Auth
The NIST National Vulnerability Database (NVD) is the U.S. government repository of standards-based vulnerability...
Tools
8 tools

EPSS

Security & Auth
The Exploit Prediction Scoring System (EPSS) by FIRST.org estimates the probability that a CVE will be exploited in the...
Tools
8 tools

Frequently Asked Questions

What is the Vulnerability Intelligence MCP server?

Cross-source cybersecurity vulnerability intelligence combining NIST NVD CVE data, CISA Known Exploited Vulnerabilities, and EPSS exploit probability scores into unified risk assessments. Essential for security teams and AI-assisted vulnerability triage workflows. It provides 30 tools that AI agents can use through the Model Context Protocol (MCP).

How do I connect Vulnerability Intelligence to my AI agent?

Add the MCPBundles server URL to your MCP client configuration (Claude Desktop, Cursor, VS Code, etc.). The URL format is: https://mcp.mcpbundles.com/bundle/vulnerability-intelligence. Authentication is handled automatically.

How many tools does Vulnerability Intelligence provide?

Vulnerability Intelligence provides 30 tools that can be called by AI agents.

What authentication does Vulnerability Intelligence require?

Vulnerability Intelligence uses No auth required or API Key. NIST NVD requires credentials. Connect via MCPBundles and authentication is handled automatically.

Setup Instructions

Connect Vulnerability Intelligence to any MCP client in minutes

https://mcp.mcpbundles.com/bundle/vulnerability-intelligence

What is MCP?

Model Context Protocol lets AI tools call external capabilities securely through a single URL. This bundle groups tools behind an MCP endpoint that many clients can use.

Use this bundle in 3 steps

  1. Copy the MCP URL above
  2. Open your AI tool and add a new MCP/connector
  3. Paste the URL and follow any auth prompts

Claude Desktop Users

Skip the manual setup! Use the .mcpb file format for one-click installation. Check the Claude Desktop tab for setup instructions.

Pick your tool tab for exact steps

Select ChatGPT, Cursor, Claude Code, or another tab for copy-paste config.

Ready to chat with Vulnerability Intelligence?

Same flow: Studio opens on this server after sign-in. Keep chatting to call tools from the conversation.

Vulnerability Intelligence MCP Server — 30 Tools