
Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure (CVD).
Vulnerability-Lookup is also a collaborative platform where users can comment on security advisories and create bundles.
This software is under AGPLv3 license. You are welcome to copy, modify or redistribute the source code according to the Affero GPL license.
Log in or create an account to join our community of contributors and start contributing today.
You can read the official documentation as well as the documentation dedicated to the API.
A user manual is also available.
Found a bug? Report it here.
Security advisories
Vulnerability-Lookup consolidates vulnerabilities from multiple sources.
- CVE List v5 281999 vulnerabilities
- NIST 281992 vulnerabilities
- FKIE 281989 vulnerabilities
- Global Security Database 335809 vulnerabilities
- GitHub 266519 vulnerabilities
- OpenSSF Malicious Packages 27375 vulnerabilities
- CERT-Bund 14247 vulnerabilities
- NCSC NL 633 vulnerabilities
- Siemens 404 vulnerabilities
- Red Hat 54953 vulnerabilities
- CISA 4866 vulnerabilities
- Open-Xchange 34 vulnerabilities
- CISCO 3928 vulnerabilities
- Microsoft 3004 vulnerabilities
- PySec 3122 vulnerabilities
- VARIoT 42913 vulnerabilities
- JVN iPedia 2967 vulnerabilities
- Tailscale 27 vulnerabilities
Sightings
This page lists the sources and tools we use to collect sightings.
We are dedicated to regularly publishing comprehensive JSON dumps of all integrated sources as open data, with updates provided on a consistent basis.
Operator of the instance: Computer Incident Response Center Luxembourg (CIRCL)
Email: info@circl.lu
More information about this instance.