GnistAI GnistAI
Log in

NVD (National Vulnerability Database)

Search the NIST National Vulnerability Database — CVE records with CVSS scores, CWE weaknesses, advisory references, affected products, and change history. 250K+ vulnerabilities from 1999 to present.

Overview   |   MCP Docs   |   API Docs   |   OpenAPI   |   Playground   |   Tutorial   |   Toolkits   |   Home
status: healthy status status healthy healthy tools: 4 tools tools 4 4 Security

Data source: NIST NVD 2.0 API (nvd.nist.gov)

MCP MCP Protocol

Endpoint https://context.gnist.ai/mcp/nvd/
claude_desktop_config.json
{
  "mcpServers": {
    "gnist-nvd": {
      "url": "https://context.gnist.ai/mcp/nvd/",
      "headers": {
        "Gnist-API-Key": "YOUR_API_KEY"
      }
    }
  }
}
Shell
curl -X POST "https://context.gnist.ai/mcp/nvd/" \
  -H "Content-Type: application/json" \
  -H "Accept: application/json, text/event-stream" \
  -H "Gnist-API-Key: YOUR_API_KEY" \
  -d '{"jsonrpc": "2.0", "method": "tools/call", "id": 1, "params": {"name": "get_cve", "arguments": {"cve_id": "example"}}}'

API REST API

API Root https://context.gnist.ai/rest/nvd/

4 endpoints available:

Shell
curl "https://context.gnist.ai/rest/nvd/get_cve?cve_id=example" \
  -H "Gnist-API-Key: YOUR_API_KEY"
Python
import httpx

resp = httpx.get(
    "https://context.gnist.ai/rest/nvd/get_cve",
    headers={"Gnist-API-Key": "YOUR_API_KEY"},
    params={
        "cve_id": "example"
},
)
print(resp.json())

OpenAPI Spec  ·  Full API Docs

CLI Command Line

Command gc nvd

CLI documentation will be available when the GnistAI SDK is published.

Install
pip install gnistai

Available Tools (4)

search_cves
Search the NIST National Vulnerability Database for CVEs.
ParameterTypeRequiredDescription
keywordanyoptionalKeyword to search CVE descriptions (e.g. "buffer overflow", "SQL injection").
cve_idanyoptionalSpecific CVE ID (e.g. "CVE-2024-0001"). Returns exact match.
severityanyoptionalCVSS v3 severity: "LOW", "MEDIUM", "HIGH", or "CRITICAL".
pub_start_dateanyoptionalStart of publication date range (ISO 8601, e.g. "2024-01-01T00:00:00.000").
pub_end_dateanyoptionalEnd of publication date range (ISO 8601, e.g. "2024-12-31T23:59:59.999").
cpe_nameanyoptionalCPE match string for affected product (e.g. "cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*").
results_per_pageintegeroptionalMaximum results to return (1-50, default 10). (default: 10)
get_cve
Get full details for a specific CVE from the National Vulnerability Database.
ParameterTypeRequiredDescription
cve_idstringrequiredCVE identifier (e.g. "CVE-2024-0001", "CVE-2021-44228").
get_cve_history
Get the change history for a specific CVE.
ParameterTypeRequiredDescription
cve_idstringrequiredCVE identifier (e.g. "CVE-2024-0001").
report_feedback
Report a bug, feature request, or general feedback for this data source.
ParameterTypeRequiredDescription
feedbackstringrequired
feedback_typestringoptional (default: "general")

Related