Vulnerability Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure (CVD).
Find a file
Cédric Bonhomme 6f38ccf36a
Some checks are pending
CodeQL / Analyze (push) Waiting to run
Deploy Jekyll with GitHub Pages dependencies preinstalled / build (push) Waiting to run
Deploy Jekyll with GitHub Pages dependencies preinstalled / deploy (push) Blocked by required conditions
MyPy / Python 3.10 sample (push) Waiting to run
MyPy / Python 3.11 sample (push) Waiting to run
MyPy / Python 3.12 sample (push) Waiting to run
API Test / Python 3.10 sample (push) Waiting to run
API Test / Python 3.11 sample (push) Waiting to run
API Test / Python 3.12 sample (push) Waiting to run
Models Tests / Python 3.10 sample (push) Waiting to run
Models Tests / Python 3.11 sample (push) Waiting to run
Models Tests / Python 3.12 sample (push) Waiting to run
new: [website] Added a button in the admin dashboard to trigger the update of the documentation.
2024-11-24 11:23:26 +01:00
.github chg: Use tests from PyVulnerabilityLookup 2024-07-31 16:15:04 +02:00
bin chg: [bin] add a parameter to run_command in order to specify the command working directory. 2024-11-22 14:19:31 +01:00
cache chg: [backend] fixed permissions of run_redis.sh and run_krocks.sh: added executable flag. 2024-05-14 07:36:28 +02:00
config Change csaf_downloader location to reflect repo move 2024-10-28 21:03:58 +01:00
docs chg: [documentation] Improved documentation CSS. 2024-11-23 18:00:47 +01:00
etc new: Use generic framework 2023-05-16 16:53:37 +02:00
logs updated .gitignore 2024-07-03 13:21:27 +02:00
storage chg: [backend] fixed permissions of run_redis.sh and run_krocks.sh: added executable flag. 2024-05-14 07:36:28 +02:00
tests chg: [website] Returns a HTTP code 409 on duplicate sightings. 2024-11-19 09:35:37 +01:00
tools fix: [tools] Fixed a typo. 2024-07-30 14:38:57 +02:00
vulnerabilitylookup chg: [website] Returns a HTTP code 409 on duplicate sightings. 2024-11-19 09:35:37 +01:00
website new: [website] Added a button in the admin dashboard to trigger the update of the documentation. 2024-11-24 11:23:26 +01:00
.editorconfig chg: [website] Added more comments and cleaned code. 2024-07-09 13:52:32 +02:00
.gitignore chg: Updated .gitignore to ingore /data 2024-09-18 12:08:58 +02:00
.gitmodules new: Importer for ossf_malicious_packages 2024-01-25 15:51:01 +01:00
.pre-commit-config.yaml chg: harmonized indentation in pre-commit.yaml file. 2024-07-16 10:36:06 +02:00
.readthedocs.yaml chg: [documentation] Added .readthedocs.yaml 2024-04-26 00:12:56 +02:00
AUTHORS chg: [documentation] Updated documentation. 2024-07-16 09:37:56 +02:00
CHANGELOG.md chg: [RELEASE] Bumped version number, updated CHANGELOG and documentation. 2024-11-14 10:10:49 +01:00
CODE_OF_CONDUCT.md chg: [configuration] Skip validation of web service config if not able to load reference configuration. 2024-07-29 10:20:28 +02:00
LICENSE.md new: [LICENSE] AGPL because AGPL 2023-05-01 17:04:02 +02:00
mypy.ini chg: [website] Added missing mypy annotations. 2024-07-09 08:29:52 +02:00
poetry.lock chg: [config] set number of workers to 49 with reuse-port 2024-11-19 14:30:15 +01:00
pyproject.toml chg: [bin] Added link to the documentation in the footer. 2024-11-22 13:25:13 +01:00
README.md chg: [bin] The updater can now update the documentation. 2024-11-22 12:06:32 +01:00
SECURITY.md chg: [documentation] Added SECURITY.md file and CHANGELOG.md file in order to simply list notables changes between releases. 2024-07-22 16:07:55 +02:00

Vulnerability Lookup

Vulnerability-Lookup logo

Latest release License Contributors Stars

Vulnerability Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure (CVD). Vulnerability Lookup is also a collaborative platform where users can comment on security advisories and create bundles.

A Vulnerability Lookup instance operated by CIRCL is available at https://vulnerability.circl.lu.

Features

  • API: A comprehensive and fast lookup API for searching vulnerabilities and identifying correlations by vulnerability identifier.
  • Feeders: Modular system to import vulnerabilities from different sources.
  • CVD process: Creation, edition and fork/copy of Security Advisories with the vulnogram editor. Support of local vulnerability source per Vulnerability Lookup instance.
  • Sightings: Users have the possibility to add observations to vulnerabilities with different types of sightings, such as: seen, exploited, not exploited, confirmed, not confirmed, patched, and not patched.
  • Comments: Ability to add, review and share comments on vulnerability advisories.
  • Bundles: Possibility to create bundles of vulnerability advisories with a description.
  • RSS/Atom: An extensive RSS and Atom support for vulnerabilities and comments.
  • EPSS: Integration of the Exploit Prediction Scoring System score.

A documentation is available here.

Sources and Feeders

  • CISA Known exploited vulnerability DB (via HTTP).
  • NIST NVD CVE importer (via API 2.0).
  • CVEProject - cvelist (via git submodule repository).
  • Cloud Security Alliance - GSD-Database (via git submodule repository).
  • GitHub Advisory Database (via git submodule repository).
  • PySec Advisory Database (via git submodule repository).
  • OpenSSF Malicious Packages (via git submodule repository)
  • Additional sources via CSAF including CERT-Bund, CISA, Cisco, nozominetworks, Open-Xchange, Red Hat, Sick, Siemens.
  • VARIoT IoT vulnerabilities database.
  • JVN iPedia, Japan database of vulnerability countermeasure information.
  • Tailscale security bulletins.

Sighting Sources

Vulnerability-lookup supports the ability to record sightings of vulnerabilities (whether published or unpublished by a source), and a series of sighting clients already exist:

Installation

Requirements

Installation instructions are available in the documentation.

Why Vulnerability Lookup ?

Vulnerability Lookup is a rewritten version of cve-search, an open-source tool initially aimed at maintaining a local CVE database. The original cve-search had design and scalability limitations, and its public instance operated by CIRCL is maxing out at 20,000 queries per second.

As vulnerability sources have diversified beyond the NVD CVE, a new tool was needed to support the CVD process, allowing for bundling, commenting, publishing, and extending vulnerability information in a collaborative manner.

Architecture

Overview of the Vulnerability Lookup architecture

License

vulnerability-lookup is free software released under the "GNU Affero General Public License v3.0".

Copyright (c) 2023-2024 Computer Incident Response Center Luxembourg (CIRCL)
Copyright (c) 2023-2024 Alexandre Dulaunoy - https://github.com/adulau
Copyright (c) 2023-2024 Raphaël Vinot - https://github.com/Rafiot
Copyright (c) 2024 Cédric Bonhomme - https://github.com/cedricbonhomme