MCP Vulnerability Checker Server
Server Configuration
Describes the environment variables required to run the server.
| Name | Required | Description | Default |
|---|---|---|---|
No arguments | |||
Capabilities
Server capabilities have not been inspected yet.
Tools
Functions exposed to the LLM to take actions
| Name | Description |
|---|---|
| cve_lookupC | Lookup CVE vulnerability information from the National Vulnerability Database |
| package_vulnerability_checkA | Check for known vulnerabilities in Python packages using OSV database |
| get_epss_scoreA | Get EPSS exploitability prediction score for a CVE |
| calculate_cvss_scoreB | Calculate CVSS base score from vector string |
| search_vulnerabilitiesC | Search vulnerability databases with advanced filtering |
| get_exploit_availabilityA | Check for public exploits and PoCs for a CVE |
| get_vulnerability_timelineC | Get vulnerability timeline and patch status information |
| get_vex_statusC | Check VEX vulnerability status for specific products |
Prompts
Interactive templates invoked by user choice
| Name | Description |
|---|---|
No prompts | |
Resources
Contextual data attached and managed by the client
| Name | Description |
|---|---|
No resources | |
Latest Blog Posts
MCP directory API
We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/firetix/vulnerability-intelligence-mcp-server'
If you have feedback or need assistance with the MCP directory API, please join our Discord server