Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure (CVD).
Vulnerability-Lookup is also a collaborative platform where users can comment on security advisories and create bundles.
This software is under AGPLv3 license. You are welcome to copy, modify or redistribute the source code according to the Affero GPL license.
Log in or create an account to join our community of contributors and start contributing today.
You can read the official documentation as well as the documentation dedicated to the API.
A user manual and a FAQ are also available.
Found a bug? Report it here.
From the beginning, Vulnerability-Lookup was designed to operate independently of specific vulnerability identifiers, making it inherently compatible with the Global CVE Allocation System (GCVE).
This Vulnerability-Lookup instance is linked to GNA-1.
Security advisories
Vulnerability-Lookup consolidates vulnerabilities from multiple sources.
- CVE Program Creative Commons Attribution 4.0 International (CC BY 4.0) 346160 vulnerabilities
- NVD Public Domain 346158 vulnerabilities
- FKIE NVD 346158 vulnerabilities
- GitHub Creative Commons Attribution 4.0 International (CC BY 4.0) 328218 vulnerabilities
- PySec Creative Commons Attribution 4.0 International (CC BY 4.0) 3230 vulnerabilities
- GSD Creative Commons Zero v1.0 Universal 335809 vulnerabilities
- OpenSSF Malicious Packages Apache License 2.0 466838 vulnerabilities
- CSAF ABB 53 vulnerabilities
- CSAF CERT-Bund 9405 vulnerabilities
- CSAF CISA 3727 vulnerabilities
- CSAF CISCO 4160 vulnerabilities
- CSAF Microsoft 13608 vulnerabilities
- CSAF NCSC-NL 817 vulnerabilities
- CSAF Nozomi Networks 64 vulnerabilities
- CSAF OpenSuse Creative Commons Attribution 4.0 International (CC BY 4.0) 10340 vulnerabilities
- CSAF Open-Xchange 22 vulnerabilities
- CSAF Red Hat Creative Commons Attribution 4.0 International (CC BY 4.0) 42300 vulnerabilities
- CSAF Schneider Electric 276 vulnerabilities
- CSAF Sick 74 vulnerabilities
- CSAF Siemens 897 vulnerabilities
- CSAF Suse Creative Commons Attribution 4.0 International (CC BY 4.0) 19636 vulnerabilities
- OSV AlmaLinux MIT 3484 vulnerabilities
- OSV Haskell Creative Commons Zero v1.0 Universal 33 vulnerabilities
- OSV Ocaml Creative Commons Zero v1.0 Universal 12 vulnerabilities
- OSV OSS Fuzz Creative Commons Attribution 4.0 International (CC BY 4.0) 3875 vulnerabilities
- OSV Rustsec Creative Commons Attribution 4.0 International (CC BY 4.0) 1034 vulnerabilities
- Bitnami VulnDB Apache License 2.0 5133 vulnerabilities
- Cleanstart Apache License 2.0 791 vulnerabilities
- Drupal MIT 27 vulnerabilities
- Tailscale 36 vulnerabilities
- CERT FR Alerte 773 vulnerabilities
- CERT FR Avis 33407 vulnerabilities
- JVNDB 3226 vulnerabilities
- CNVD 129708 vulnerabilities
- FSTEC 82977 vulnerabilities
- VARIoT 41946 vulnerabilities
- CERT@VDE 2 vulnerabilities
- Phoenix Contact GmbH & Co. KG 107 vulnerabilities
- Welotec GmbH 5 vulnerabilities
- CODESYS GmbH 28 vulnerabilities
- Wiesemann & Theis GmbH 7 vulnerabilities
- MB connect line GmbH 22 vulnerabilities
- Helmholz GmbH & Co. KG 20 vulnerabilities
- Festo SE & Co. KG 18 vulnerabilities
- Pepperl+Fuchs SE 33 vulnerabilities
- Pilz GmbH & Co. KG 19 vulnerabilities
- WAGO GmbH & Co. KG 79 vulnerabilities
- ifm electronic GmbH 4 vulnerabilities
- Beckhoff Automation GmbH & Co. KG 17 vulnerabilities
- Trumpf SE + Co. KG 17 vulnerabilities
- Lenze SE 5 vulnerabilities
- Carlo Gavazzi Automation 1 vulnerability
- AUMA Riester GmbH & Co. KG 6 vulnerabilities
- Bender GmbH & Co. KG 4 vulnerabilities
- Endress+Hauser AG 19 vulnerabilities
- Frauscher Sensortechnik GmbH 4 vulnerabilities
- Miele & Cie KG 4 vulnerabilities
- Weidmueller Interface GmbH & Co. KG 16 vulnerabilities
- SMA Solar Technology AG 7 vulnerabilities
- HIMA Paul Hildebrandt GmbH 2 vulnerabilities
- Murrelektronik GmbH 1 vulnerability
- SWARCO TRAFFIC SYSTEMS GmbH 1 vulnerability
- ads-tec Industrial IT GmbH 3 vulnerabilities
- VARTA Storage GmbH 1 vulnerability
- Sauter AG 1 vulnerability
- Janitza electronics GmbH 2 vulnerabilities
- Mettler-Toledo GmbH 2 vulnerabilities
- GNA-1 (CIRCL) 68 vulnerabilities
- GNA-1337 (AHA!) 5 vulnerabilities
Sightings
This page lists the sources and tools we use to collect sightings.
The Vulnerability-Lookup project is dedicated to regularly publishing comprehensive JSON dumps of all integrated sources as open data, with updates provided on a consistent basis.
AI datasets and models derived from the project are also released on Hugging Face for public use and further research.
Operator of the instance: Computer Incident Response Center Luxembourg (CIRCL)
Email: info@circl.lu
More information about this instance.