Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure (CVD).
Vulnerability-Lookup is also a collaborative platform where users can comment on security advisories and create bundles.
This software is under AGPLv3 license. You are welcome to copy, modify or redistribute the source code according to the Affero GPL license.
Log in or create an account to join our community of contributors and start contributing today.
You can read the official documentation as well as the documentation dedicated to the API.
A user manual and a FAQ are also available.
Found a bug? Report it here.
From the beginning, Vulnerability-Lookup was designed to operate independently of specific vulnerability identifiers, making it inherently compatible with the Global CVE Allocation System (GCVE).
This Vulnerability-Lookup instance is linked to GNA-1.
Security advisories
Vulnerability-Lookup consolidates vulnerabilities from multiple sources.
- CVE Program Creative Commons Attribution 4.0 International (CC BY 4.0) 340838 vulnerabilities
- NVD Public Domain 340835 vulnerabilities
- FKIE NVD 340833 vulnerabilities
- GitHub Creative Commons Attribution 4.0 International (CC BY 4.0) 323092 vulnerabilities
- PySec Creative Commons Attribution 4.0 International (CC BY 4.0) 3229 vulnerabilities
- GSD Creative Commons Zero v1.0 Universal 335809 vulnerabilities
- OpenSSF Malicious Packages Apache License 2.0 466086 vulnerabilities
- CSAF ABB 50 vulnerabilities
- CSAF CERT-Bund 9344 vulnerabilities
- CSAF CISA 3698 vulnerabilities
- CSAF CISCO 4136 vulnerabilities
- CSAF Microsoft 13128 vulnerabilities
- CSAF NCSC-NL 793 vulnerabilities
- CSAF Nozomi Networks 62 vulnerabilities
- CSAF OpenSuse Creative Commons Attribution 4.0 International (CC BY 4.0) 10098 vulnerabilities
- CSAF Open-Xchange 22 vulnerabilities
- CSAF Red Hat Creative Commons Attribution 4.0 International (CC BY 4.0) 41722 vulnerabilities
- CSAF Schneider Electric 273 vulnerabilities
- CSAF Sick 73 vulnerabilities
- CSAF Siemens 889 vulnerabilities
- CSAF Suse Creative Commons Attribution 4.0 International (CC BY 4.0) 19049 vulnerabilities
- OSV AlmaLinux MIT 3350 vulnerabilities
- OSV Haskell Creative Commons Zero v1.0 Universal 30 vulnerabilities
- OSV Ocaml Creative Commons Zero v1.0 Universal 11 vulnerabilities
- OSV OSS Fuzz Creative Commons Attribution 4.0 International (CC BY 4.0) 3847 vulnerabilities
- OSV Rustsec Creative Commons Attribution 4.0 International (CC BY 4.0) 998 vulnerabilities
- Bitnami VulnDB Apache License 2.0 4920 vulnerabilities
- Cleanstart Apache License 2.0 428 vulnerabilities
- Drupal MIT 24 vulnerabilities
- Tailscale 36 vulnerabilities
- CERT FR Alerte 772 vulnerabilities
- CERT FR Avis 33289 vulnerabilities
- JVNDB 3193 vulnerabilities
- CNVD 129149 vulnerabilities
- FSTEC 82977 vulnerabilities
- VARIoT 41946 vulnerabilities
- CERT@VDE 2 vulnerabilities
- Phoenix Contact GmbH & Co. KG 106 vulnerabilities
- Welotec GmbH 5 vulnerabilities
- CODESYS GmbH 27 vulnerabilities
- Wiesemann & Theis GmbH 7 vulnerabilities
- MB connect line GmbH 21 vulnerabilities
- Helmholz GmbH & Co. KG 17 vulnerabilities
- Festo SE & Co. KG 18 vulnerabilities
- Pepperl+Fuchs SE 33 vulnerabilities
- Pilz GmbH & Co. KG 18 vulnerabilities
- WAGO GmbH & Co. KG 76 vulnerabilities
- ifm electronic GmbH 4 vulnerabilities
- Beckhoff Automation GmbH & Co. KG 17 vulnerabilities
- Trumpf SE + Co. KG 17 vulnerabilities
- Lenze SE 5 vulnerabilities
- Carlo Gavazzi Automation 1 vulnerability
- AUMA Riester GmbH & Co. KG 6 vulnerabilities
- Bender GmbH & Co. KG 4 vulnerabilities
- Endress+Hauser AG 17 vulnerabilities
- Frauscher Sensortechnik GmbH 4 vulnerabilities
- Miele & Cie KG 4 vulnerabilities
- Weidmueller Interface GmbH & Co. KG 16 vulnerabilities
- SMA Solar Technology AG 7 vulnerabilities
- HIMA Paul Hildebrandt GmbH 2 vulnerabilities
- Murrelektronik GmbH 1 vulnerability
- SWARCO TRAFFIC SYSTEMS GmbH 1 vulnerability
- ads-tec Industrial IT GmbH 3 vulnerabilities
- VARTA Storage GmbH 1 vulnerability
- Sauter AG 1 vulnerability
- Janitza electronics GmbH 2 vulnerabilities
- Mettler-Toledo GmbH 1 vulnerability
- GNA-1 (CIRCL) 64 vulnerabilities
- GNA-1337 (AHA!) 4 vulnerabilities
Sightings
This page lists the sources and tools we use to collect sightings.
The Vulnerability-Lookup project is dedicated to regularly publishing comprehensive JSON dumps of all integrated sources as open data, with updates provided on a consistent basis.
AI datasets and models derived from the project are also released on Hugging Face for public use and further research.
Operator of the instance: Computer Incident Response Center Luxembourg (CIRCL)
Email: info@circl.lu
More information about this instance.