search_cves
Pack: nvd · Endpoint: https://gateway.pipeworx.io/nvd/mcp
Search for CVE vulnerabilities by keyword. Returns CVE ID, description, severity, and CVSS score. Use when researching security threats or checking if a known vulnerability affects your systems.
Parameters
| Name | Type | Required | Description |
|---|---|---|---|
query | string | yes | Keyword(s) to search in CVE descriptions |
limit | number | no | Maximum number of results to return (default 10, max 2000) |
Example call
Arguments
{
"query": "log4j"
}
curl
curl -X POST https://gateway.pipeworx.io/nvd/mcp \
-H 'Content-Type: application/json' \
-d '{"jsonrpc":"2.0","id":1,"method":"tools/call","params":{"name":"search_cves","arguments":{"query":"log4j"}}}'
TypeScript (@pipeworx/sdk)
import { Pipeworx } from '@pipeworx/sdk';
const pipeworx = new Pipeworx();
const result = await pipeworx.call('search_cves', {
"query": "log4j"
});
More examples
{
"query": "Apache Struts remote code execution",
"limit": 50
}
Response shape
Always returns: total_results, returned, cves
| Field | Type | Description |
|---|---|---|
total_results | number | Total number of CVEs matching the search query |
returned | number | Number of CVEs returned in this response |
cves | array | List of CVE records matching the search |
Full JSON Schema
{
"type": "object",
"properties": {
"total_results": {
"type": "number",
"description": "Total number of CVEs matching the search query"
},
"returned": {
"type": "number",
"description": "Number of CVEs returned in this response"
},
"cves": {
"type": "array",
"description": "List of CVE records matching the search",
"items": {
"type": "object",
"properties": {
"id": {
"type": "string",
"description": "CVE identifier"
},
"published": {
"type": "string",
"description": "Publication date in ISO 8601 format"
},
"last_modified": {
"type": "string",
"description": "Last modification date in ISO 8601 format"
},
"status": {
"type": "string",
"description": "Vulnerability status (e.g., PUBLISHED)"
},
"description": {
"type": "string",
"description": "English description of the vulnerability"
},
"cvss_score": {
"type": [
"number",
"null"
],
"description": "CVSS base score (v3.1 preferred, falls back to v2)"
},
"severity": {
"type": [
"string",
"null"
],
"description": "Severity rating (CRITICAL, HIGH, MEDIUM, LOW, NONE)"
}
},
"required": [
"id",
"published",
"last_modified",
"status",
"description",
"cvss_score",
"severity"
]
}
}
},
"required": [
"total_results",
"returned",
"cves"
]
}
Connect
Add this to your MCP client config, or use one-click install buttons:
{
"mcpServers": {
"nvd": {
"url": "https://gateway.pipeworx.io/nvd/mcp"
}
}
}
See Getting Started for client-specific install steps.