Skip to content

vulnerability-lookup/vulnerability-lookup

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2,468 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Vulnerability-Lookup

Vulnerability-Lookup logo

Latest release License Contributors Stars

Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure (CVD). Vulnerability-Lookup is also a collaborative platform where users can comment on security advisories and create bundles.

A Vulnerability-Lookup instance operated by CIRCL is available at https://vulnerability.circl.lu.
GCVE is also running a Vulnerability-Lookup instance at https://db.gcve.eu.

Main features

  • Feeders: Modular ingestion framework to import vulnerabilities from multiple sources. Default feeders are bundled and enabled out of the box.
  • CVD process: End-to-end management of Security Advisories and Coordinated Vulnerability Disclosures.
  • Local sources: Support for adding instance-specific, custom vulnerability sources.
  • Global CVE Allocation System: Native integration with the GCVE.
  • KEV catalogs: Per-instance management with synchronization of remote KEV catalogs (e.g. ENISA, CISA).
  • Sightings: Record and track vulnerability observations, including seen, exploited, not exploited, confirmed, not confirmed, patched, and not patched.
  • Comments: Add, review, and share analyst notes on advisories.
  • Bundles: Group related vulnerability advisories with contextual descriptions for easier tracking and analysis.
  • Synchronization: Optional synchronization of comments, bundles, sightings, and KEV entries between instances.
  • RSS/Atom: Subscribe to vulnerability updates and comments via RSS or Atom feeds.
  • EPSS: Integration with the Exploit Prediction Scoring System for improved risk prioritization.
  • Watchlists: Monitor vulnerabilities affecting specific products and receive email notifications.
  • API: Fast and comprehensive vulnerability lookup API, including cross-source correlation by vulnerability identifier.

For more information, refer to the user manual or the documentation.

Sources and Default Feeders

The default sources included in Vulnerability-Lookup are the following:

National Vulnerability Databases

Community & Open Source Databases

CSAF-based Sources

OSV Sources

Specialized Sources

Weakness & Attack Pattern Catalogs

  • CWE (Common Weakness Enumeration)
  • CAPEC (Common Attack Pattern Enumeration and Classification)

Known Exploited Vulnerabilities Catalogs

Sighting Sources

Vulnerability-Lookup facilitates the recording of vulnerability sightings, regardless of whether they have been published by a source. A suite of sighting clients is already available to support this functionality:

Our tools on the Python Package Index (PyPI):

Tool Description
ShadowSight A client that retrieves vulnerability observations from the The Shadowserver Foundation and pushes them to a Vulnerability-Lookup instance.
FediVuln A client to gather vulnerability-related information from the Fediverse.
BlueSkySight A client to gather vulnerability-related information from Bluesky.
MISPSight A client that retrieves vulnerability observations from a MISP server and pushes them to a Vulnerability-Lookup instance.
NucleiVuln A client designed to retrieve vulnerability-related observations from the Nuclei Git repository of templates and pushes them to a Vulnerability-Lookup instance.
ExploitDBSighting A client that retrieves vulnerability observations from Exploit-DB and pushes them to a Vulnerability-Lookup instance.
KEVSight A client to generate sightings for Vulnerability-Lookup from the Known Exploited Vulnerabilities (KEV) catalog.
GistSight A client for gathering vulnerability-related information from GitHub Gists.
MetasploitSight A client designed to retrieve vulnerability-related information from the modules available in Metasploit.

If you want to create your own sigthing tool, it's recommended to use PyVulnerabilityLookup, a Python library to access Vulnerability-Lookup via its REST API.

Installation

Generally speaking, requirements are the following:

Installation instructions are available in the documentation.

Architecture

Overview of the Vulnerability-Lookup architecture

License

Vulnerability-Lookup is free software released under the "GNU Affero General Public License v3.0".

Copyright (c) 2023-2026 Computer Incident Response Center Luxembourg (CIRCL)
Copyright (c) 2023-2026 Alexandre Dulaunoy - https://github.com/adulau
Copyright (c) 2023-2026 Raphaël Vinot - https://github.com/Rafiot
Copyright (c) 2024-2026 Cédric Bonhomme - https://github.com/cedricbonhomme

About

Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure (CVD).

Topics

Resources

License

Code of conduct

Contributing

Security policy

Stars

Watchers

Forks

Packages

 
 
 

Contributors