Cybersecurity Vulnerability Intel MCP
Real-time CVE lookup via NIST NVD 2.0, CISA KEV alerts, EPSS exploitation probability, and MITRE ATT&CK mappings. 7 tools for AI-powered vulnerability assessment.
Cybersecurity Vulnerability Intelligence MCP Server
Unified vulnerability intelligence from 4 government data sources in a single MCP server. Get enriched CVE lookups with CVSS scores, active exploitation status, exploitation probability, and ATT&CK techniques — all in one call.
Data Sources
| Source | What It Provides | Update Frequency |
|---|---|---|
| NIST NVD 2.0 | CVE details, CVSS scores, descriptions, references, CWE classifications | Continuous |
| CISA KEV | Actively exploited vulnerabilities catalog, remediation deadlines | Daily |
| FIRST.org EPSS | Exploitation probability scores (0-1) predicting likelihood of exploitation in next 30 days | Daily |
| MITRE ATT&CK | Adversary techniques mapped to CVEs | Quarterly |
Tools
vuln_lookup_cve — Enriched CVE Lookup (Recommended Start)
The killer feature. Look up any CVE and get intelligence from all 4 sources in a single call.
Parameters:
cveId(required): CVE identifier (e.g.,CVE-2021-44228)
Returns: NVD details + CVSS score + KEV exploitation status + EPSS probability + ATT&CK techniques
Example: Look up Log4Shell → Get CVSS 10.0, confirmed in CISA KEV, EPSS 0.97 (97th percentile), mapped to T1190 (Exploit Public-Facing Application).
vuln_search — Search CVEs
Search the NVD by keyword, severity, and date range.
Parameters:
keyword: Search term (e.g., "apache log4j", "buffer overflow")severity: LOW, MEDIUM, HIGH, or CRITICALpubStartDate/pubEndDate: ISO date rangehasKev: If true, only return CVEs in the CISA KEV cataloglimit: Max results (1-50, default 20)
vuln_kev_latest — Recently Exploited Vulnerabilities
Get vulnerabilities recently added to CISA's Known Exploited Vulnerabilities catalog.
Parameters:
days: Look back period (default 7)limit: Max results (default 20)
vuln_kev_due_soon — Upcoming Remediation Deadlines
Get KEV entries with remediation deadlines approaching. Critical for federal compliance.
Parameters:
days: Deadline within N days (default 14)limit: Max results (default 20)
vuln_epss_top — Highest Exploitation Probability
Get CVEs most likely to be exploited in the next 30 days based on EPSS machine learning model.
Parameters:
threshold: Minimum EPSS score 0-1 (default 0.7 = 70%)limit: Max results (default 20)
vuln_trending — Newly Published Critical CVEs
Get recently published high/critical severity CVEs from the NVD.
Parameters:
days: Published within last N days (default 3)severity: Minimum severity level (default CRITICAL)limit: Max results (default 20)
vuln_by_vendor — Vendor Vulnerability Assessment
Search CVEs for a specific vendor/product. Cross-references with CISA KEV to flag actively exploited issues.
Parameters:
vendor(required): Vendor name (e.g., "microsoft", "apache")product: Narrow by product (e.g., "windows", "log4j")limit: Max results (default 20)
Use Cases
- Vulnerability triage: Look up a CVE and instantly know if it's actively exploited, its EPSS score, and what ATT&CK techniques apply
- Patch prioritization: Combine KEV status + EPSS scores to prioritize remediation
- Compliance tracking: Monitor upcoming CISA KEV remediation deadlines
- Threat intelligence: Track trending CVEs and newly weaponized vulnerabilities
- Vendor risk assessment: Assess a vendor's vulnerability exposure and active exploitation status
Attribution
- This product uses data from the NVD API but is not endorsed or certified by the NVD.
- EPSS data provided by FIRST.org (https://www.first.org/epss/).
- ATT&CK is a registered trademark of The MITRE Corporation. Licensed under Apache 2.0.
- CISA Known Exploited Vulnerabilities Catalog — US Government public domain.
관련 서버
timeService-mcp
A simple Model Context Protocol (MCP) server that provides the current date and time.
Wordle MCP
Fetches the Wordle solution for a specific date, available from 2021-05-19 up to 23 days in the future.
Proxenio MCP Server
MCP server for the Proxenio verified intent network enabling AI agents to retrieve verified matches and accept introductions with inherited trust controls.
RootVine
Cross-platform music link resolution for AI agents. Connects Claude, ChatGPT, and other AI agents to trusted music data via the Model Context Protocol.
mycop
AI code security scanner with 100 built-in rules covering OWASP Top 10 and CWE Top 25
MCP Minecraft Remote
Remotely control a Minecraft Java Edition server using the Model Context Protocol (MCP).
Time MCP Server
Provides current time and timezone conversion capabilities using IANA timezone names, with automatic system timezone detection.
MCPlayerOne
An AI-powered, synthwave, maze-crawling, and world-building adventure game server.
MCP-HA-Connect
A production-ready Model Context Protocol (MCP) server for Home Assistant integration with AI assistants like Claude.
xcomet-mcp-server
Translation quality evaluation using xCOMET models. Provides quality scoring (0-1), error detection with severity levels, and optimized batch processing with 25x speedup.