Skip to main content
Glama

Exploit Intelligence Platform — CVE & Vulnerability Scanner

Server Details

Vulnerability and exploit intelligence for AI assistants (370K+ CVEs, 105K+ exploits)

Status
Healthy
Last Tested
Transport
Streamable HTTP
URL

See and control every tool call

Log every tool call with full inputs and outputs
Control which tools are enabled per connector
Manage credentials once, use from any MCP client
Monitor uptime and get alerted when servers go down

Available Tools

16 tools
audit_stackTry in Inspector

Audit a technology stack for exploitable vulnerabilities. Accepts a comma-separated list of technologies (max 5) and searches for critical/ high severity CVEs with public exploits for each one, sorted by EPSS exploitation probability. Use this when a user describes their infrastructure and wants to know what to patch first. Example: technologies='nginx, postgresql, node.js' returns a risk-sorted list of exploitable CVEs grouped by technology.

ParametersJSON Schema
NameRequiredDescriptionDefault
technologiesYesComma-separated list of technologies (e.g. 'nginx, postgresql, node.js'). Max 5.
check_healthTry in Inspector

Check the EIP API health and data freshness. Returns database status and timestamps for each of the 10 ingestion sources (NVD, KEV, EPSS, ExploitDB, GitHub, Metasploit, etc.).

ParametersJSON Schema
NameRequiredDescriptionDefault

No parameters

generate_findingTry in Inspector

Generate a pentest report finding in Markdown format for a specific vulnerability. Fetches full detail and formats it as a professional finding with severity, CVSS, description, affected products, exploit availability, and references. Accepts both CVE-IDs and EIP-IDs. Optionally include the target system tested and tester notes. The output is ready to paste into a pentest report. Example: cve_id='CVE-2024-3400', target='fw.corp.example.com', notes='Confirmed RCE via GlobalProtect gateway'.

ParametersJSON Schema
NameRequiredDescriptionDefault
notesNoTester notes to include in the finding. Optional.
cve_idYesCVE or EIP identifier (e.g. 'CVE-2024-3400')
targetNoTarget system tested (e.g. 'fw.corp.example.com'). Optional.
get_authorTry in Inspector

Get an exploit author's profile with all their exploits. Returns author name, handle, total exploit count, activity start date, and a paginated list of their exploits with CVE context. Use this when asked about a specific researcher like 'show me all exploits by Chocapikk'.

ParametersJSON Schema
NameRequiredDescriptionDefault
author_nameYesAuthor name (e.g. 'Chocapikk')
get_cweTry in Inspector

Get details for a specific CWE including full name, description, exploit likelihood, parent CWE, and total vulnerability count. Example: cwe_id='CWE-79' returns details about Cross-Site Scripting.

ParametersJSON Schema
NameRequiredDescriptionDefault
cwe_idYesCWE identifier (e.g. 'CWE-79' or '79')
get_exploit_codeTry in Inspector

Retrieve the source code of a specific exploit by its platform ID. IMPORTANT: Use the platform's internal ID shown as [id=XXXXX] in results, NOT the ExploitDB number (EDB-XXXXX). These are different numbering systems. Returns code from the exploit archive. If no file_path is specified, auto-selects the most relevant code file. Use this to analyze exploit mechanics, understand attack techniques, or review PoC code.

ParametersJSON Schema
NameRequiredDescriptionDefault
file_pathNoSpecific file path to view (optional — auto-selects if omitted)
exploit_idYesPlatform exploit ID (the [id=XXXXX] number from results — NOT the EDB number)
get_nuclei_templatesTry in Inspector

Get Nuclei scanner templates and recon dorks for a vulnerability. Returns template metadata, severity, verification status, tags, and ready-to-use Shodan, FOFA, and Google dork queries for target identification. Accepts both CVE-IDs and EIP-IDs. Use this to plan scanning or reconnaissance.

ParametersJSON Schema
NameRequiredDescriptionDefault
cve_idYesCVE or EIP identifier (e.g. 'CVE-2024-27198')
get_platform_statsTry in Inspector

Get platform-wide statistics from the Exploit Intelligence Platform. Returns total counts of vulnerabilities, exploits, KEV entries, Nuclei templates, vendors, and authors, plus the last data update timestamp.

ParametersJSON Schema
NameRequiredDescriptionDefault

No parameters

get_vulnerabilityTry in Inspector

Get a full intelligence brief for a specific vulnerability. Accepts both CVE-IDs (e.g. CVE-2024-3400) and EIP-IDs (e.g. EIP-2026-12345 for pre-CVE entries). Returns detailed information including CVSS score and vector, EPSS exploitation probability, CISA KEV status, description, affected products, ranked exploits (grouped by Metasploit modules, verified ExploitDB, GitHub PoCs, and trojans), Nuclei scanner templates with recon dorks, alternate identifiers, and references. Exploits are ranked by quality: Metasploit modules first (peer-reviewed), then verified ExploitDB, then GitHub by stars. Trojans are flagged at the bottom.

ParametersJSON Schema
NameRequiredDescriptionDefault
cve_idYesCVE or EIP identifier (e.g. 'CVE-2024-3400' or 'EIP-2026-12345')
list_authorsTry in Inspector

List exploit authors/researchers ranked by exploit count. Returns the top security researchers with their exploit counts and handles. Use this when asked 'who are the top exploit authors?' or 'who writes the most exploits?'

ParametersJSON Schema
NameRequiredDescriptionDefault
pageNoPage number (default: 1)
per_pageNoResults per page (1-50, default: 25)
list_cwesTry in Inspector

List CWE (Common Weakness Enumeration) categories ranked by vulnerability count. Returns CWE IDs, names, short labels, exploit likelihood, and how many CVEs have that weakness. Use this when asked 'what are the most common vulnerability types?'

ParametersJSON Schema
NameRequiredDescriptionDefault

No parameters

list_productsTry in Inspector

List products for a specific vendor with vulnerability counts. Use this to discover exact product names for filtering. Product names in the database use CPE conventions (e.g. 'exchange_server' not 'exchange', 'windows_10' not 'windows 10'). Example: vendor='microsoft' returns products like exchange_server, windows_10, office, edge_chromium.

ParametersJSON Schema
NameRequiredDescriptionDefault
vendorYesVendor name (e.g. 'microsoft', 'apache', 'fortinet')
list_vendorsTry in Inspector

List software vendors ranked by vulnerability count. Returns the top 200 vendors with their total CVE counts. Use this when asked 'which vendors have the most vulnerabilities?' or to understand the threat landscape by vendor.

ParametersJSON Schema
NameRequiredDescriptionDefault

No parameters

lookup_alt_idTry in Inspector

Look up a vulnerability by an alternate identifier such as an ExploitDB ID (EDB-XXXXX) or GitHub Security Advisory ID (GHSA-XXXXX). Returns the matching CVE-ID with basic severity info. Use this when you have an EDB number or GHSA ID and need to find the corresponding CVE.

ParametersJSON Schema
NameRequiredDescriptionDefault
alt_idYesAlternate ID (e.g. 'EDB-48537', 'GHSA-jfh8-c2jp-5v3q')
search_exploitsTry in Inspector

Browse and filter exploits using STRUCTURED FILTERS ONLY (no free-text query). Use this to filter by source (github, metasploit, exploitdb, nomisec), language (python, ruby, etc.), LLM classification (working_poc, trojan, suspicious, scanner, stub, writeup), author, min stars, code availability, CVE ID, vendor, or product. Also filter by AI analysis: attack_type (RCE, SQLi, XSS, DoS, LPE, auth_bypass, info_leak), complexity (trivial/simple/moderate/complex), reliability (reliable/unreliable/untested), requires_auth. NOTE: To search by product name (e.g. 'OpenSSH', 'Apache'), use search_vulnerabilities instead — it has free-text query and get_vulnerability already includes exploits in the response. Examples: source='metasploit' for all Metasploit modules; attack_type='RCE' with reliability='reliable' for weaponizable RCE exploits; cve='CVE-2024-3400' for all exploits targeting a specific CVE; vendor='mitel' for all Mitel exploits.

ParametersJSON Schema
NameRequiredDescriptionDefault
cveNoFilter by CVE ID (e.g. 'CVE-2024-3400') — returns all exploits for that CVE
pageNoPage number (default: 1)
sortNoSort order
authorNoFilter by author name
sourceNoFilter by source: github (direct GitHub crawl, ~400), metasploit (~3,900 modules), exploitdb (~52K), nomisec (GitHub PoCs via nomi-sec, ~19K — most GitHub exploits are here), writeup (reference writeups)
vendorNoFilter by vendor name (e.g. 'mitel', 'fortinet') — returns exploits for all CVEs affecting that vendor
productNoFilter by product name (e.g. 'micollab', 'pan-os')
has_codeNoOnly exploits with downloadable code
languageNoFilter by language: python, ruby, go, c, etc.
per_pageNoResults per page (1-25, default: 10)
min_starsNoMinimum GitHub stars
complexityNoFilter by exploit complexity: trivial, simple, moderate, complex
attack_typeNoFilter by attack type from AI analysis: RCE, SQLi, XSS, DoS, LPE, auth_bypass, info_leak, deserialization, other
reliabilityNoFilter by exploit reliability: reliable, unreliable, untested
requires_authNoFilter by whether exploit requires authentication
llm_classificationNoFilter by LLM classification: working_poc, trojan, suspicious, scanner, stub, writeup, tool
search_vulnerabilitiesTry in Inspector

Search the Exploit Intelligence Platform for vulnerabilities (CVEs). Returns a list of matching CVEs with CVSS scores, EPSS exploitation probability, exploit counts, and CISA KEV status. Supports full-text search, severity/vendor/product/ecosystem/CWE filters, and CVSS/EPSS thresholds. Use this for broad searches like 'apache vulnerabilities' or filtered queries like 'critical Fortinet CVEs with exploits'. Examples: query='apache httpd' with has_exploits=true; vendor='fortinet' with severity='critical' and is_kev=true sorted by epss_desc; cwe='89' with min_cvss=9 for critical SQL injection CVEs.

ParametersJSON Schema
NameRequiredDescriptionDefault
cweNoFilter by CWE ID (e.g. '79' or 'CWE-79')
pageNoPage number (default: 1)
sortNoSort order (default: newest)
yearNoFilter by CVE year (e.g. 2024)
queryNoSearch keywords (e.g. 'apache httpd', 'log4j'). Optional if filters are provided.
is_kevNoOnly return CISA Known Exploited Vulnerabilities
vendorNoFilter by vendor name (e.g. 'microsoft', 'fortinet')
date_toNoEnd date for CVE publication (YYYY-MM-DD)
productNoFilter by product name (e.g. 'exchange', 'pan-os')
min_cvssNoMinimum CVSS score (0-10)
min_epssNoMinimum EPSS score (0-1)
per_pageNoResults per page (1-25, default: 10)
severityNoFilter by severity level
date_fromNoStart date for CVE publication (YYYY-MM-DD)
ecosystemNoFilter by package ecosystem
has_nucleiNoOnly return CVEs with Nuclei scanner templates
has_exploitsNoOnly return CVEs with public exploit code

Discussions

No comments yet. Be the first to start the discussion!

Try in Browser

Your Connectors

Sign in to create a connector for this server.