Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure (CVD).
Vulnerability-Lookup is also a collaborative platform where users can comment on security advisories and create bundles.
This software is under AGPLv3 license. You are welcome to copy, modify or redistribute the source code according to the Affero GPL license.
Log in or create an account to join our community of contributors and start contributing today.
You can read the official documentation as well as the documentation dedicated to the API.
A user manual and a FAQ are also available.
Found a bug? Report it here.
From the beginning, Vulnerability-Lookup was designed to operate independently of specific vulnerability identifiers, making it inherently compatible with the Global CVE Allocation System (GCVE).
This Vulnerability-Lookup instance is linked to GNA-1.
Security advisories
Vulnerability-Lookup consolidates vulnerabilities from multiple sources.
- CVE Program Creative Commons Attribution 4.0 International (CC BY 4.0) 345246 vulnerabilities
- NVD Public Domain 345238 vulnerabilities
- FKIE NVD 345230 vulnerabilities
- GitHub Creative Commons Attribution 4.0 International (CC BY 4.0) 327392 vulnerabilities
- PySec Creative Commons Attribution 4.0 International (CC BY 4.0) 3230 vulnerabilities
- GSD Creative Commons Zero v1.0 Universal 335809 vulnerabilities
- OpenSSF Malicious Packages Apache License 2.0 466737 vulnerabilities
- CSAF ABB 53 vulnerabilities
- CSAF CERT-Bund 9398 vulnerabilities
- CSAF CISA 3715 vulnerabilities
- CSAF CISCO 4159 vulnerabilities
- CSAF Microsoft 13504 vulnerabilities
- CSAF NCSC-NL 811 vulnerabilities
- CSAF Nozomi Networks 64 vulnerabilities
- CSAF OpenSuse Creative Commons Attribution 4.0 International (CC BY 4.0) 10324 vulnerabilities
- CSAF Open-Xchange 22 vulnerabilities
- CSAF Red Hat Creative Commons Attribution 4.0 International (CC BY 4.0) 42138 vulnerabilities
- CSAF Schneider Electric 276 vulnerabilities
- CSAF Sick 73 vulnerabilities
- CSAF Siemens 897 vulnerabilities
- CSAF Suse Creative Commons Attribution 4.0 International (CC BY 4.0) 19522 vulnerabilities
- OSV AlmaLinux MIT 3470 vulnerabilities
- OSV Haskell Creative Commons Zero v1.0 Universal 33 vulnerabilities
- OSV Ocaml Creative Commons Zero v1.0 Universal 12 vulnerabilities
- OSV OSS Fuzz Creative Commons Attribution 4.0 International (CC BY 4.0) 3866 vulnerabilities
- OSV Rustsec Creative Commons Attribution 4.0 International (CC BY 4.0) 1030 vulnerabilities
- Bitnami VulnDB Apache License 2.0 5115 vulnerabilities
- Cleanstart Apache License 2.0 757 vulnerabilities
- Drupal MIT 26 vulnerabilities
- Tailscale 36 vulnerabilities
- CERT FR Alerte 773 vulnerabilities
- CERT FR Avis 33383 vulnerabilities
- JVNDB 3217 vulnerabilities
- CNVD 129587 vulnerabilities
- FSTEC 82977 vulnerabilities
- VARIoT 41946 vulnerabilities
- CERT@VDE 2 vulnerabilities
- Phoenix Contact GmbH & Co. KG 106 vulnerabilities
- Welotec GmbH 5 vulnerabilities
- CODESYS GmbH 27 vulnerabilities
- Wiesemann & Theis GmbH 7 vulnerabilities
- MB connect line GmbH 22 vulnerabilities
- Helmholz GmbH & Co. KG 19 vulnerabilities
- Festo SE & Co. KG 18 vulnerabilities
- Pepperl+Fuchs SE 33 vulnerabilities
- Pilz GmbH & Co. KG 18 vulnerabilities
- WAGO GmbH & Co. KG 79 vulnerabilities
- ifm electronic GmbH 4 vulnerabilities
- Beckhoff Automation GmbH & Co. KG 17 vulnerabilities
- Trumpf SE + Co. KG 17 vulnerabilities
- Lenze SE 5 vulnerabilities
- Carlo Gavazzi Automation 1 vulnerability
- AUMA Riester GmbH & Co. KG 6 vulnerabilities
- Bender GmbH & Co. KG 4 vulnerabilities
- Endress+Hauser AG 18 vulnerabilities
- Frauscher Sensortechnik GmbH 4 vulnerabilities
- Miele & Cie KG 4 vulnerabilities
- Weidmueller Interface GmbH & Co. KG 16 vulnerabilities
- SMA Solar Technology AG 7 vulnerabilities
- HIMA Paul Hildebrandt GmbH 2 vulnerabilities
- Murrelektronik GmbH 1 vulnerability
- SWARCO TRAFFIC SYSTEMS GmbH 1 vulnerability
- ads-tec Industrial IT GmbH 3 vulnerabilities
- VARTA Storage GmbH 1 vulnerability
- Sauter AG 1 vulnerability
- Janitza electronics GmbH 2 vulnerabilities
- Mettler-Toledo GmbH 1 vulnerability
- GNA-1 (CIRCL) 68 vulnerabilities
- GNA-1337 (AHA!) 5 vulnerabilities
Sightings
This page lists the sources and tools we use to collect sightings.
The Vulnerability-Lookup project is dedicated to regularly publishing comprehensive JSON dumps of all integrated sources as open data, with updates provided on a consistent basis.
AI datasets and models derived from the project are also released on Hugging Face for public use and further research.
Operator of the instance: Computer Incident Response Center Luxembourg (CIRCL)
Email: info@circl.lu
More information about this instance.