{
"mcpServers": {
"vuln-nist-mcp-server": {
"command": "<see-readme>",
"args": []
}
}
}No install config available. Check the server's README for setup instructions.
Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
MCP Server for Vulnerabilities API from NVD NIST
Is it safe?
No package registry to scan.
No authentication — any process on your machine can connect.
MIT. View license →
Is it maintained?
Last commit 197 days ago. 11 stars.
Will it work with my client?
Transport: stdio. Works with Claude Desktop, Cursor, Claude Code, and most MCP clients.
No automated test available for this server. Check the GitHub README for setup instructions.
No known vulnerabilities.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationHave you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Persistent memory using a knowledge graph
Privacy-first. MCP is the protocol for tool access. We're the virtualization layer for context.
Pre-build reality check. Scans GitHub, HN, npm, PyPI, Product Hunt — returns 0-100 signal.
Monitor browser logs directly from Cursor and other MCP compatible IDEs.
MCP Security Weekly
Get CVE alerts and security updates for Vuln Nist Mcp Server and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
A Model Context Protocol (MCP) server for querying NIST National Vulnerability Database (NVD) API endpoints.
This MCP server exposes tools to query the NVD/CVE REST API and return formatted text results suitable for LLM consumption via the MCP protocol. It includes automatic query chunking for large date ranges and parallel processing for improved performance.
Base API docs: https://nvd.nist.gov/developers/vulnerabilities
get_temporal_context - Get current date and temporal context for time-relative queries
search_cves - Search CVE descriptions by keyword with flexible date filtering
keyword, resultsPerPage (default: 20), startIndex (default: 0), last_days (recent_days has been deprecated), start_date, end_datestart_date and end_date parametersstart_date/end_date → last_days → default 30 daysget_cve_by_id - Retrieve detailed information for a specific CVE
cve_idcves_by_cpe - List CVEs associated with a Common Platform Enumeration (CPE)
cpe_name (full CPE 2.3 format required), is_vulnerable (optional)kevs_between - Find CVEs added to CISA KEV catalog within a date range
kevStartDate, kevEndDate, resultsPerPage (default: 20), startIndex (default: 0)cve_change_history - Retrieve change history for CVEs
cve_id OR (changeStartDate + changeEndDate), resultsPerPage (default: 20), startIndex (default: 0)get_temporal_context tool for accurate time-relative querieslast_days) and absolute (start_date/end_date) date rangesservices.nvd.nist.gov)# Clone and build
git clone https://github.com/HaroldFinchIFT/vuln-nist-mcp-server
cd vuln-nist-mcp-server
docker build -t vuln-nist-mcp-server .
# Run
docker run --rm -it vuln-nist-mcp-server
Environment variables:
NVD_BASE_URL: Base URL for NVD API (default: https://services.nvd.nist.gov/rest/json)NVD_VERSION: API version (default: /2.0)NVD_API_TIMEOUT: Request timeout in seconds (default: 10)Get temporal context for time-relative queries:
Tool: get_temporal_context
Params: {}
**Se