Chat with AI and run tools instantly — no account needed.
The Exploit Prediction Scoring System (EPSS) by FIRST.org estimates the probability that a CVE will be exploited in the wild within 30 days. Look up exploit scores for specific CVEs, discover the most exploitable vulnerabilities, track score trends over time, and filter by score or percentile ranges for risk prioritization.
Domain knowledge for EPSS — workflow patterns, data models, and gotchas for your AI agent.
The Exploit Prediction Scoring System (EPSS) by FIRST.org estimates the probability a CVE will be exploited within 30 days. Prioritize remediation by exploit likelihood.
Discover the most exploitable CVEs by EPSS score. Filter by minimum/maximum exploit probability to find vulnerabilities most likely to be exploited in...
Generate a threat landscape report showing how many CVEs fall into each EPSS risk band (CRITICAL/HIGH/MEDIUM/LOW). Provides total counts at each thres...
Get the EPSS exploit prediction score for a CVE at a specific historical date. Useful for understanding how exploit risk has evolved, or for retrospec...
Find CVEs by EPSS percentile ranking. The percentile shows where a CVE ranks relative to all other scored CVEs. A percentile of 0.99 means the CVE has...
Get the 30-day EPSS score trend for a specific CVE. Shows how the exploit prediction probability has changed over the past month. Useful for identifyi...
Look up EPSS exploit prediction scores for one or more CVEs. Returns the probability (0-1) that each CVE will be exploited in the wild within 30 days,...
Search the EPSS database by CVE ID pattern. Find all scored CVEs matching a text pattern — useful for year-based analysis (e.g., 'CVE-2025'), vendor-r...
Triage a list of CVEs from a vulnerability scan by exploit probability. Pass in CVE IDs from a scan report and get back a prioritized remediation plan...
The Exploit Prediction Scoring System (EPSS) by FIRST.org estimates the probability that a CVE will be exploited in the wild within 30 days. Look up exploit scores for specific CVEs, discover the most exploitable vulnerabilities, track score trends over time, and filter by score or percentile ranges for risk prioritization. It provides 8 tools that AI agents can use through the Model Context Protocol (MCP).
Add the MCPBundles server URL to your MCP client configuration (Claude Desktop, Cursor, VS Code, etc.). The URL format is: https://mcp.mcpbundles.com/bundle/epss. Authentication is handled automatically.
EPSS provides 8 tools that can be called by AI agents, along with a SKILL.md that gives your AI agent domain knowledge about when and how to use them.
EPSS uses open data APIs — no authentication required.
Connect EPSS to any MCP client in minutes
Model Context Protocol lets AI tools call external capabilities securely through a single URL. This bundle groups tools behind an MCP endpoint that many clients can use.
Skip the manual setup! Use the .mcpb file format for one-click installation. Check the Claude Desktop tab for setup instructions.
Select ChatGPT, Cursor, Claude Code, or another tab for copy-paste config.
More security integrations you might like
ActionGate provides tools for assessing risk scores and simulating scenarios related to policy compl...
Agent Safe provides a suite of tools for assessing the safety of emails and URLs, ensuring secure co...
This server acts as a gateway for managing persistent identities and shared content within a collabo...
Bright Security focuses on application security, providing tools to identify and mitigate vulnerabil...
Certman allows users to create and manage their own Certificate Authority, providing tools for inter...
The CISA Known Exploited Vulnerabilities (KEV) Catalog is the authoritative U.S. government list of ...