Skip to main content
Glama

query_for_cve_affected

Query the OSV database to identify and retrieve the affected versions for a specified CVE, enabling precise vulnerability analysis and management.

Instructions

Query the OSV database for a CVE and return the affected versions. Args: cve: The CVE ID to query Returns: A list of affected versions

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
cveYes

Implementation Reference

  • MCP tool handler for 'query_for_cve_affected'. Instantiates OSVServer and delegates to its query_for_cve_affected method, which executes the core logic.
    @mcp.tool() def query_for_cve_affected(cve: str): """ Query the OSV database for a CVE and return the affected versions. Args: cve: The CVE ID to query Returns: A list of affected versions """ osv = OSVServer() return osv.query_for_cve_affected(cve)
  • Core implementation in OSVServer class: queries OSV API for CVE details and parses affected package versions using helper methods _query_cve and _parse_versions.
    def query_for_cve_affected(self, cve: str): """ Query the OSV database for a CVE and return the affected versions. """ data = self._query_cve(cve) versions = self._parse_versions(data) return versions
  • Helper method to fetch CVE data from OSV API via GET request.
    def _query_cve(self, cve: str): """ Query the OSV database for a CVE. """ url = self.cve_url.format(cve_id=cve) response = requests.get(url) return response.json()
  • Helper method to extract affected versions from OSV response JSON.
    def _parse_versions(self, data: dict): """ Parse version strings from the OSV response. Extracts versions from the 'versions' array in the affected package data. Args: data: The full OSV response JSON data Returns: List of version strings """ versions = [] if 'affected' in data: for affected in data['affected']: if 'versions' in affected: versions.extend(affected['versions']) versions = list(set(versions)) return versions
  • src/server.py:139-139 (registration)
    The @mcp.tool() decorator registers the query_for_cve_affected function as an MCP tool.
    @mcp.tool()

Other Tools

Related Tools

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/EdenYavin/OSV-MCP'

If you have feedback or need assistance with the MCP directory API, please join our Discord server