Vulnerability Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure (CVD). https://www.vulnerability-lookup.org
Find a file
Cédric Bonhomme b6ddf3d7b0
Some checks failed
CodeQL / Analyze (push) Has been cancelled
MyPy / Python 3.12 sample (push) Has been cancelled
API Test / Python 3.10 sample (push) Has been cancelled
API Test / Python 3.11 sample (push) Has been cancelled
API Test / Python 3.12 sample (push) Has been cancelled
API Test / Python 3.13 sample (push) Has been cancelled
Models Tests / Python 3.10 sample (push) Has been cancelled
Models Tests / Python 3.11 sample (push) Has been cancelled
Models Tests / Python 3.12 sample (push) Has been cancelled
chg: [dependencies] Updated Python dependencies.
2025-05-27 11:20:18 +02:00
.github chg: [typing] In tools.clear_feeds a feature not available in Python 3.10 and 3.11 is used. 2025-03-26 10:47:28 +01:00
bin chg: [emb3d] Cleanup and quick refactoring 2025-05-02 15:40:54 +02:00
cache chg: Bump deps, add support for valkey, new kvrocks 2024-05-13 11:28:57 +02:00
config chg: [config] Updated default website configuration file 2025-05-21 13:21:34 +02:00
docs chg: [doc] hardware requirements added 2025-05-25 16:18:23 +02:00
etc chg: Updated dependencies, documentation, CHANGELOG and improved some endpoints (used to export CPE information). 2025-03-26 15:30:56 +01:00
logs updated .gitignore 2024-07-03 13:21:27 +02:00
storage chg: Bump kvrocks config, support docker. 2024-12-09 14:35:59 +01:00
tests chg: [typing] Make Mypy Happy Again. 2025-02-10 09:21:33 +01:00
tools new: tool to completely remove the kvrocks and redis DBs 2025-03-07 14:41:22 +01:00
vulnerabilitylookup new: [API] Added a new endpoint for CISA KEV entries and improved get_all_entries_from_cisa_known_exploited from the vulnerabilitylookup module. 2025-05-13 18:55:33 +02:00
website chg: [website] The Jinja macro circl_view now uses the cvelistv5_view macro. 2025-05-27 11:10:56 +02:00
.editorconfig chg: [website] Added more comments and cleaned code. 2024-07-09 13:52:32 +02:00
.env.sample Dirty dockerized version 2025-04-09 16:46:39 +02:00
.gitignore cho: Updated .gitignore. 2025-03-30 21:38:29 +02:00
.gitmodules chg: [emb3d] Cleanup and quick refactoring 2025-05-02 15:40:54 +02:00
.pre-commit-config.yaml updated .pre-commit-config.yaml 2025-04-09 15:48:12 +02:00
AUTHORS chg: [documentation] Updated documentation. 2024-07-16 09:37:56 +02:00
CHANGELOG.md chg: [RELEASE] Updated CHANGELOG and pyproject.toml. 2025-05-27 11:02:03 +02:00
CODE_OF_CONDUCT.md chg: [configuration] Skip validation of web service config if not able to load reference configuration. 2024-07-29 10:20:28 +02:00
docker-compose.yml Dirty dockerized version 2025-04-09 16:46:39 +02:00
Dockerfile Dirty dockerized version 2025-04-09 16:46:39 +02:00
LICENSE.md new: [LICENSE] AGPL because AGPL 2023-05-01 17:04:02 +02:00
mypy.ini new: CWE and CAPEC importers 2024-12-09 21:17:12 +01:00
new_source.md Merge remote-tracking branch 'refs/remotes/origin/vulnerability-lookup_test' into vulnerability-lookup_test 2025-04-28 18:38:41 +02:00
poetry.lock chg: [dependencies] Updated Python dependencies. 2025-05-27 11:20:18 +02:00
pyproject.toml chg: [RELEASE] Updated CHANGELOG and pyproject.toml. 2025-05-27 11:02:03 +02:00
README.md chg: [gcve] Updated about.html and README.md file. 2025-04-16 21:59:14 +02:00
run.sh Dirty dockerized version 2025-04-09 16:46:39 +02:00
SECURITY.md chg: various harmonization of reformatting 2025-01-09 14:52:41 +01:00

Vulnerability-Lookup

Vulnerability-Lookup logo

Latest release License Contributors Stars

Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure (CVD). Vulnerability-Lookup is also a collaborative platform where users can comment on security advisories and create bundles.

A Vulnerability-Lookup instance operated by CIRCL is available at https://vulnerability.circl.lu.

Main features

  • API: A comprehensive and fast lookup API for searching vulnerabilities and identifying correlations by vulnerability identifier.
  • Feeders: Modular system to import vulnerabilities from different sources.
  • CVD process: Management of Security Advisories and Vulnerability Disclosures.
  • Support of local vulnerability source per Vulnerability-Lookup instance.
  • Global CVE Allocation System: Support of the Global CVE Allocation System (GCVE).
  • Sightings: Users have the possibility to add observations to vulnerabilities with different types of sightings, such as: seen, exploited, not exploited, confirmed, not confirmed, patched, and not patched.
  • Comments: Ability to add, review and share comments on vulnerability advisories.
  • Bundles: Possibility to create bundles of vulnerability advisories with a description.
  • RSS/Atom: An extensive RSS and Atom support for vulnerabilities and comments.
  • EPSS: Integration of the Exploit Prediction Scoring System.
  • Track vulnerabilities with your custom product watch lists and receive email notifications.

For more information, refer to the user manual or the documentation.

Sources and Feeders

  • CISA Known exploited vulnerability DB (via HTTP).
  • NIST NVD CVE importer (via API 2.0), Fraunhofer FKIE NVD.
  • CVEProject - cvelist (via git submodule repository).
  • Cloud Security Alliance - GSD-Database (via git submodule repository).
  • GitHub Advisory Database (via git submodule repository).
  • PySec Advisory Database (via git submodule repository).
  • OpenSSF Malicious Packages (via git submodule repository)
  • Additional sources via CSAF including CERT-Bund, CISA, Cisco, nozominetworks, Open-Xchange, Red Hat, Sick, Siemens, NCSC-NL, Microsoft.
  • VARIoT IoT vulnerabilities database.
  • JVN iPedia, Japan database of vulnerability countermeasure information.
  • Tailscale security bulletins.
  • CWE (Common Weakness Enumeration) and CAPEC (Common Attack Pattern Enumeration and Classification)

Sighting Sources

Vulnerability-Lookup facilitates the recording of vulnerability sightings, regardless of whether they have been published by a source. A suite of sighting clients is already available to support this functionality:

Our tools on the Python Package Index (PyPI):

Tool Description
ShadowSight A client that retrieves vulnerability observations from the The Shadowserver Foundation and pushes them to a Vulnerability-Lookup instance.
FediVuln A client to gather vulnerability-related information from the Fediverse.
BlueSkySight A client to gather vulnerability-related information from Bluesky.
MISPSight A client that retrieves vulnerability observations from a MISP server and pushes them to a Vulnerability-Lookup instance.
NucleiVuln A client designed to retrieve vulnerability-related observations from the Nuclei Git repository of templates and pushes them to a Vulnerability-Lookup instance.
ExploitDBSighting A client that retrieves vulnerability observations from Exploit-DB and pushes them to a Vulnerability-Lookup instance.
KEVSight A client to generate sightings for Vulnerability-Lookup from the Known Exploited Vulnerabilities (KEV) catalog.
GistSight A client for gathering vulnerability-related information from GitHub Gists.

If you want to create your own sigthing tool, it's recommended to use PyVulnerabilityLookup, a Python library to access Vulnerability-Lookup via its REST API.

Installation

Generally speaking, requirements are the following:

Installation instructions are available in the documentation.

Architecture

Overview of the Vulnerability-Lookup architecture

License

Vulnerability-Lookup is free software released under the "GNU Affero General Public License v3.0".

Copyright (c) 2023-2025 Computer Incident Response Center Luxembourg (CIRCL)
Copyright (c) 2023-2025 Alexandre Dulaunoy - https://github.com/adulau
Copyright (c) 2023-2025 Raphaël Vinot - https://github.com/Rafiot
Copyright (c) 2024-2025 Cédric Bonhomme - https://github.com/cedricbonhomme