Research Vulnerabilities by Software
Search for known vulnerabilities affecting specific software products, libraries, or frameworks in your stack.
Search CVEs & track new advisories
Search the full CVE catalog by keyword, look up any CVE by ID, or monitor recent advisories. Results include CVSS severity scores, affected software, CWE types, and reference links. For security researchers, dependency auditing, and DevSecOps pipelines.
Search the vulnerability database by keyword. Find CVEs related to specific software, libraries, or vulnerability types. Returns severity scores, descriptions, and links.
curl -H "Authorization: Bearer $TOOLROUTER_API_KEY" \
-d '{
"tool": "vulnerability-database",
"skill": "search_vulnerabilities",
"input": {
"query": "log4j"
}
}' \
https://api.toolrouter.com/v1/tools/callGet full details for a specific CVE by its ID. Returns description, CVSS score, severity, weakness types, references, and affected configurations.
curl -H "Authorization: Bearer $TOOLROUTER_API_KEY" \
-d '{
"tool": "vulnerability-database",
"skill": "cve_details",
"input": {
"cve_id": "CVE-2021-44228"
}
}' \
https://api.toolrouter.com/v1/tools/callGet recently published vulnerabilities. Filter by time period to stay current on new security advisories and emerging threats.
curl -H "Authorization: Bearer $TOOLROUTER_API_KEY" \
-d '{
"tool": "vulnerability-database",
"skill": "recent_vulnerabilities",
"input": {
"days": 7
}
}' \
https://api.toolrouter.com/v1/tools/callclaude mcp add --transport stdio \
--env TOOLROUTER_API_KEY=YOUR_API_KEY \
toolrouter -- npx -y toolrouter-mcpcurl -H "Authorization: Bearer $TOOLROUTER_API_KEY" \
-d '{"tool":"vulnerability-database","skill":"search_vulnerabilities","input":{}}' \
https://api.toolrouter.com/v1/tools/callSearch for known vulnerabilities affecting specific software products, libraries, or frameworks in your stack.
Look up detailed information about specific CVEs including severity, affected versions, exploit availability, and patches.
Run comprehensive vulnerability scans against web applications to identify security weaknesses.
Check HTTP security headers across your web properties to identify missing protections like CSP, HSTS, and X-Frame-Options.
Comprehensive security assessment combining infrastructure probing, vulnerability scanning, penetration testing, and CVE intelligence.
Identify, verify, and plan remediation for vulnerabilities using CVE databases, scanning, and deep research.
Audit systems against compliance frameworks using automated scanning, vulnerability checks, auth testing, and research.
Investigate security incidents by verifying DNS integrity, scanning for compromise indicators, and researching threat intelligence.
Yes. The database supports keyword search and direct CVE lookups.
You get CVSS severity, affected software, CWE type, and reference links.
Yes. It is a good fit for security research, dependency auditing, and DevSecOps workflows.
Yes. Recent advisories are part of the search surface.