Skip to main content
Glama

MCP Vulnerability Checker Server

by firetix

get_exploit_availability

Identify public exploits and PoCs for a specific CVE by analyzing sources like ExploitDB, Metasploit, GitHub, and NVD. Assess exploit availability, active exploitation indicators, and weaponization status to determine immediate risk.

Instructions

Check for public exploits and PoCs for a CVE

Input Schema

NameRequiredDescriptionDefault
cve_idYesCheck for public exploits and proof-of-concepts (PoCs) for a CVE across multiple sources including ExploitDB, Metasploit, GitHub, and NVD references. Provide a CVE ID in the format CVE-YYYY-NNNN (e.g., CVE-2021-44228). Returns threat intelligence about exploit availability, active exploitation indicators, and weaponization status to assess immediate risk.

Input Schema (JSON Schema)

{ "properties": { "cve_id": { "description": "Check for public exploits and proof-of-concepts (PoCs) for a CVE across multiple sources including ExploitDB, Metasploit, GitHub, and NVD references. Provide a CVE ID in the format CVE-YYYY-NNNN (e.g., CVE-2021-44228). Returns threat intelligence about exploit availability, active exploitation indicators, and weaponization status to assess immediate risk.", "type": "string" } }, "required": [ "cve_id" ], "type": "object" }

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/firetix/vulnerability-intelligence-mcp-server'

If you have feedback or need assistance with the MCP directory API, please join our Discord server