Vulnerability Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure (CVD).
Find a file
2024-11-12 09:22:11 +01:00
.github chg: Use tests from PyVulnerabilityLookup 2024-07-31 16:15:04 +02:00
bin chg: [website] The dump command can now dump the sightings. It is as well possible to execute the dump of the sightings from the Web admin interface. 2024-10-18 10:11:28 +02:00
cache chg: [backend] fixed permissions of run_redis.sh and run_krocks.sh: added executable flag. 2024-05-14 07:36:28 +02:00
config Change csaf_downloader location to reflect repo move 2024-10-28 21:03:58 +01:00
docs chg: [website] Added new source field for sightings. 2024-10-29 08:42:58 +01:00
etc new: Use generic framework 2023-05-16 16:53:37 +02:00
logs updated .gitignore 2024-07-03 13:21:27 +02:00
storage chg: [backend] fixed permissions of run_redis.sh and run_krocks.sh: added executable flag. 2024-05-14 07:36:28 +02:00
tests chg: [tests] Execute pytest without the -s option. 2024-07-26 22:25:19 +02:00
tools fix: [tools] Fixed a typo. 2024-07-30 14:38:57 +02:00
vulnerabilitylookup fix: get bigger chunks of variot data at a time 2024-10-15 13:28:14 +02:00
website chg: [website] Provide the possibility to the user to set the timestamp of a sighting (optional). 2024-11-12 09:22:11 +01:00
.editorconfig chg: [website] Added more comments and cleaned code. 2024-07-09 13:52:32 +02:00
.gitignore chg: Updated .gitignore to ingore /data 2024-09-18 12:08:58 +02:00
.gitmodules new: Importer for ossf_malicious_packages 2024-01-25 15:51:01 +01:00
.pre-commit-config.yaml chg: harmonized indentation in pre-commit.yaml file. 2024-07-16 10:36:06 +02:00
.readthedocs.yaml chg: [documentation] Added .readthedocs.yaml 2024-04-26 00:12:56 +02:00
AUTHORS chg: [documentation] Updated documentation. 2024-07-16 09:37:56 +02:00
CHANGELOG.md chg: [release] Bumped version number in various places and updated Python dependencies. 2024-10-18 13:56:13 +02:00
CODE_OF_CONDUCT.md chg: [configuration] Skip validation of web service config if not able to load reference configuration. 2024-07-29 10:20:28 +02:00
LICENSE.md new: [LICENSE] AGPL because AGPL 2023-05-01 17:04:02 +02:00
mypy.ini chg: [website] Added missing mypy annotations. 2024-07-09 08:29:52 +02:00
poetry.lock chg: [website] Updated dependencies (Werkzeug). 2024-10-25 22:49:44 +02:00
pyproject.toml chg: [release] Bumped version number in various places and updated Python dependencies. 2024-10-18 13:56:13 +02:00
README.md chg: [documentation] Updated documentation with new section dedicated to the sightings. 2024-10-17 09:18:01 +02:00
SECURITY.md chg: [documentation] Added SECURITY.md file and CHANGELOG.md file in order to simply list notables changes between releases. 2024-07-22 16:07:55 +02:00

Vulnerability Lookup

Latest release License Contributors Stars Documentation Status

Vulnerability Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure (CVD). Vulnerability Lookup is also a collaborative platform where users can comment on security advisories and create bundles.

A Vulnerability Lookup instance operated by CIRCL is available at https://vulnerability.circl.lu.

Features

  • API: A comprehensive and fast lookup API for searching vulnerabilities and identifying correlations by vulnerability identifier.
  • Feeders: Modular system to import vulnerabilities from different sources.
  • CVD process: Creation, edition and fork/copy of Security Advisories with the vulnogram editor. Support of local vulnerability source per Vulnerability Lookup instance.
  • Sightings: Users have the possibility to add observations to vulnerabilities with different types of sightings, such as: seen, exploited, not exploited, confirmed, not confirmed, patched, and not patched.
  • Comments: Ability to add, review and share comments on vulnerability advisories.
  • Bundles: Possibility to create bundles of vulnerability advisories with a description.
  • RSS/Atom: An extensive RSS and Atom support for vulnerabilities and comments.
  • EPSS: Integration of the Exploit Prediction Scoring System score.

A documentation is available here.

Sources and Feeders

  • CISA Known exploited vulnerability DB (via HTTP).
  • NIST NVD CVE importer (via API 2.0).
  • CVEProject - cvelist (via git submodule repository).
  • Cloud Security Alliance - GSD-Database (via git submodule repository).
  • GitHub Advisory Database (via git submodule repository).
  • PySec Advisory Database (via git submodule repository).
  • OpenSSF Malicious Packages (via git submodule repository)
  • Additional sources via CSAF including CERT-Bund, CISA, Cisco, nozominetworks, Open-Xchange, Red Hat, Sick, Siemens.
  • VARIoT IoT vulnerabilities database.
  • JVN iPedia, Japan database of vulnerability countermeasure information.
  • Tailscale security bulletins.

Installation

Requirements

Installation instructions are available in the documentation.

Why Vulnerability Lookup ?

Vulnerability Lookup is a rewritten version of cve-search, an open-source tool initially aimed at maintaining a local CVE database. The original cve-search had design and scalability limitations, and its public instance operated by CIRCL is maxing out at 20,000 queries per second.

As vulnerability sources have diversified beyond the NVD CVE, a new tool was needed to support the CVD process, allowing for bundling, commenting, publishing, and extending vulnerability information in a collaborative manner.

Architecture

Overview of the Vulnerability Lookup architecture

License

vulnerability-lookup is free software released under the "GNU Affero General Public License v3.0".

Copyright (c) 2023-2024 Computer Incident Response Center Luxembourg (CIRCL)
Copyright (c) 2023-2024 Alexandre Dulaunoy - https://github.com/adulau
Copyright (c) 2023-2024 Raphaël Vinot - https://github.com/Rafiot
Copyright (c) 2024 Cédric Bonhomme - https://github.com/cedricbonhomme