Tools / Vulnerability Database
Vulnerability Database icon

Vulnerability Database

Search CVEs & track new advisories

Search the full CVE catalog by keyword, look up any CVE by ID, or monitor recent advisories. Results include CVSS severity scores, affected software, CWE types, and reference links. For security researchers, dependency auditing, and DevSecOps pipelines.

3 skillsv0.02
Search Vulnerabilities

Search the vulnerability database by keyword. Find CVEs related to specific software, libraries, or vulnerability types. Returns severity scores, descriptions, and links.

Returns: List of CVEs with IDs, descriptions, severity scores, and detail links
Parameters
query *stringSearch keyword (e.g. "log4j", "apache", "remote code execution")
limitnumberMax results to return (default 10, max 20)
Example
Search for Log4j vulnerabilities
curl -H "Authorization: Bearer $TOOLROUTER_API_KEY" \
  -d '{
  "tool": "vulnerability-database",
  "skill": "search_vulnerabilities",
  "input": {
    "query": "log4j"
  }
}' \
  https://api.toolrouter.com/v1/tools/call
CVE Details

Get full details for a specific CVE by its ID. Returns description, CVSS score, severity, weakness types, references, and affected configurations.

Returns: Full CVE details including description, severity, CVSS vector, CWEs, and references
Parameters
cve_id *stringCVE identifier (e.g. "CVE-2021-44228")
Example
Get details for Log4Shell
curl -H "Authorization: Bearer $TOOLROUTER_API_KEY" \
  -d '{
  "tool": "vulnerability-database",
  "skill": "cve_details",
  "input": {
    "cve_id": "CVE-2021-44228"
  }
}' \
  https://api.toolrouter.com/v1/tools/call
Recent Vulnerabilities

Get recently published vulnerabilities. Filter by time period to stay current on new security advisories and emerging threats.

Returns: Recently published CVEs with severity scores and descriptions
Parameters
daysnumberLook back period in days (default 7, max 120)
limitnumberMax results to return (default 10, max 20)
Example
Vulnerabilities published this week
curl -H "Authorization: Bearer $TOOLROUTER_API_KEY" \
  -d '{
  "tool": "vulnerability-database",
  "skill": "recent_vulnerabilities",
  "input": {
    "days": 7
  }
}' \
  https://api.toolrouter.com/v1/tools/call
Loading reviews...
Loading activity...
v0.022026-03-22
  • Added subtitle, expanded description, and agent instructions
v0.012026-03-20
  • Initial release

Quick Start

MCP (Claude Code)
claude mcp add --transport stdio \
  --env TOOLROUTER_API_KEY=YOUR_API_KEY \
  toolrouter -- npx -y toolrouter-mcp
REST API
curl -H "Authorization: Bearer $TOOLROUTER_API_KEY" \
  -d '{"tool":"vulnerability-database","skill":"search_vulnerabilities","input":{}}' \
  https://api.toolrouter.com/v1/tools/call

Use Cases

Open Research Vulnerabilities by Software

Research Vulnerabilities by Software

Search for known vulnerabilities affecting specific software products, libraries, or frameworks in your stack.

Vulnerability Database icon
Vulnerability Database
4 agent guides
Open Check CVE Details

Check CVE Details

Look up detailed information about specific CVEs including severity, affected versions, exploit availability, and patches.

Vulnerability Database icon
Vulnerability Database
4 agent guides
Open Probe Security Headers

Probe Security Headers

Check HTTP security headers across your web properties to identify missing protections like CSP, HSTS, and X-Frame-Options.

Security HTTPx icon
Security HTTPx
4 agent guides
View all use cases for Vulnerability Database

Workflows

Open Full Security Assessment

Full Security Assessment

Comprehensive security assessment combining infrastructure probing, vulnerability scanning, penetration testing, and CVE intelligence.

Pentest icon
Pentest
Security HTTPx icon
Security HTTPx
Security Nuclei icon
Security Nuclei
Vulnerability Database icon
Vulnerability Database
4 steps4 tools
Open Vulnerability Remediation

Vulnerability Remediation

Identify, verify, and plan remediation for vulnerabilities using CVE databases, scanning, and deep research.

Vulnerability Database icon
Vulnerability Database
Security Nuclei icon
Security Nuclei
Web Search icon
Web Search
Deep Research icon
Deep Research
4 steps4 tools
Open Compliance Security Audit

Compliance Security Audit

Audit systems against compliance frameworks using automated scanning, vulnerability checks, auth testing, and research.

Security Nuclei icon
Security Nuclei
Vulnerability Database icon
Vulnerability Database
Pentest icon
Pentest
Deep Research icon
Deep Research
4 steps4 tools
Open Incident Response Toolkit

Incident Response Toolkit

Investigate security incidents by verifying DNS integrity, scanning for compromise indicators, and researching threat intelligence.

Security Nuclei icon
Security Nuclei
Vulnerability Database icon
Vulnerability Database
Web Search icon
Web Search
DNS Domain icon
DNS Domain
4 steps4 tools
View all 8workflows →

Frequently Asked Questions

Can I search by CVE ID or product name?

Yes. The database supports keyword search and direct CVE lookups.

What details come with a CVE?

You get CVSS severity, affected software, CWE type, and reference links.

Can it help with dependency or exposure monitoring?

Yes. It is a good fit for security research, dependency auditing, and DevSecOps workflows.

Does it include recent advisories?

Yes. Recent advisories are part of the search surface.