VulnMCP is an MCP server built with FastMCP that provides AI clients, chat agents, and other automated systems with tools for vulnerability management. It offers modular "skills" that can be easily extended or integrated, enabling intelligent analysis and automated insights on software vulnerabilities.

A new component in the galaxy of tooling of vulnerability-lookup.

Thanks to @cedric who is becoming an orchestrator for many AI tools nowadays.

#cve #gcve #vulnerability #vulnerabilitymanagement #opensource #ai #mcp #vulnerabilitylookup

๐Ÿ”— https://github.com/vulnerability-lookup/VulnMCP

GitHub - vulnerability-lookup/VulnMCP: A modular MCP providing AI-driven vulnerability management skills, including severity classification and automated insights.

A modular MCP providing AI-driven vulnerability management skills, including severity classification and automated insights. - vulnerability-lookup/VulnMCP

GitHub

cpe-guesser 2.0 released - Multi-Source CPE Imports, Better Ranking, and Greater Autonomy Beyond NVD

Version 2.0 brings major improvements to CPE import, ranking, and CVE v5 data handling. This release focuses on better import performance, broader format support, improved search relevance, and more robust indexing for vendor and product matching.

A notable change in this release is that cpe-guesser is no longer limited to NVD as its only practical CPE source. In addition to the NVD feeds, it can also leverage the Vulnerability-Lookup dump available at https://vulnerability.circl.lu/dumps/ , providing additional CPE sources and more autonomy from the previously NVD-only source model.

This release lays an important foundation for improving the GCVE ecosystem, especially by strengthening vendor and product references through better CPE source diversity, indexing, and matching capabilities. If you have ideas for further improvements, additional data sources, or better ways to refine vendor and product identification, we would be very happy to hear your feedback.

https://www.vulnerability-lookup.org/2026/03/22/cpe-guesser-2.0-released/

https://github.com/vulnerability-lookup/cpe-guesser

@circl
@gcve

#gcve #cve #opensource #cpe #vulnerability #vulnerabilitymanagement

Vulnerability-Lookup JSON dumps

gcve-eu-kev updated โ€” a CISA KEV and ENISA CNW/EUVD to GCVE BCP-07 converter.

It now also includes a generic RSS/Atom exporter for any GCVE KEV BCP-07 feed.

@gcve

#cybersecurity #gcve #kev #cve #vulnerability #vulnerabilitymanagement

๐Ÿ”— https://github.com/gcve-eu/gcve-eu-kev
๐Ÿ”— https://gcve.eu/bcp/gcve-bcp-07/

GitHub - gcve-eu/gcve-eu-kev: CISA/ENISA KEV to GCVE BCP-07 Converter.

CISA/ENISA KEV to GCVE BCP-07 Converter. Contribute to gcve-eu/gcve-eu-kev development by creating an account on GitHub.

GitHub

With the recent integration of CERT-VDEโ€™s CSAF advisories, it becomes even clearer why diverse vulnerability data sources are essential.

CSAF delivers direct vendor remediation information, and when correlated with the CVE Program , it highlights how important federation and data correlation are for remediation efforts and vulnerability management as a whole. (See example below)

๐Ÿ”— https://db.gcve.eu/vuln/vde-2025-066

#gcve #cve #vulnerabilitymanagement #cybersecurity #opensource

@circl
@gcve
@CVE_Program

A new pull request for Vulnerability-Lookup adds a CSAF producer that publishes advisories for many manufacturers.

This is great for defenders and researchers, as it increases the amount of detailed vulnerability information available.

It will push the number of ingested feeds to more than 50 unique sources, highlighting the growing diversity of our data sources.

If someone tells you there is a single source of truth for vulnerability information, theyโ€™re ignoring the reality: vulnerability intelligence comes from many different sources.

Thanks to @rafi0t for the continuous work on adding CSAF and feeds to vulnerability-lookup

#gcve #cve #cybersecurity #csaf #vulnerability #opendata #opensource

๐Ÿ”— The new PR with many new CSAF sources https://github.com/vulnerability-lookup/vulnerability-lookup/pull/348
๐Ÿ”— The open source vulnerability-lookup software https://www.vulnerability-lookup.org/
๐Ÿ”— GCVE instance https://db.gcve.eu/

@gcve
@cedric

Publishing Vulnerability Information with GCVE

With GCVE, publishing vulnerability information can be done in three straightforward steps.

#gcve #vulnerabilitymanagement #vulnerability #cybersecurity

๐Ÿ”— https://gcve.eu/publishing-vulnerability-information/

We have scheduled the community meetings for March 2026. This is where you meet fellows working with the same issues, discuss and help us set our priorities for the project.

Register for free here: https://www.gvip-project.org/community/

#CVE #gcve #NVD #EUVD #CWE #CVSS #EPSS

The GCVE.eu initiative will take part in hackathon.lu (14โ€“15 April, Luxembourg), alongside core developers of GCVE-related projects. See you there to build, experiment, and collaborate!

#gcve #cve #opensource #openstandard #hackathon

๐Ÿ”— https://hackathon.lu

@gcve
@circl

๐Ÿš€ CodeClarity v0.0.25-alpha released!

New in this version:
โ€ข Starting our GCVE journey โ€” now fetching vulnerability data from cvelistv5 hosted by CIRCL
โ€ข Archive upload โ€” import projects from .zip archives, no git repo required
โ€ข Smarter vuln detection โ€” fewer false positives, multi-language analysis

Coming soon: Beta release!

๐Ÿฆ‰ Open-source alternative to Snyk & Checkmarx
๐ŸŒ www.codeclarity.io

#OpenSource #CyberSecurity #DevSecOps #InfoSec #FOSS #AppSec #GCVE #SCA #VulnerabilityManagement

db.gcve.eu updated with Vulnerability-Lookup 4.0: Enabling Federated Vulnerability Intelligence

The GCVE project is pleased to announce a major update of the platform. The service is now running the latest version of Vulnerability-Lookup (4.0), introducing federated synchronisation capabilities that significantly expand how vulnerability intelligence can be shared, enriched, and consumed across organisations.

๐Ÿ”— https://gcve.eu/2026/02/17/db-gcve-eu-updates-2026/

#gcve #cve #cvd #opensource