Vulnerability-Lookup Service

Multi-Source Vulnerability-Lookup and Collaboration

Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure (CVD).

Vulnerability-Lookup logo

Vulnerability-Lookup is accessible via a web interface, RSS/Atom and an HTTP API. Vulnerability-Lookup is an interface to search publicly known information from security vulnerabilities in software and hardware along with their corresponding exposures. You can also register and collaborate on the vulnerability intelligence by adding comments or even reporting vulnerabilities.

Main features

  • API: A comprehensive and fast lookup API for searching vulnerabilities and identifying correlations by vulnerability identifier.
  • Feeders: Modular system to import vulnerabilities from different sources.
  • CVD process: Creation, edition and fork/copy of Security Advisories with the vulnogram editor. Support of local vulnerability source per Vulnerability-Lookup instance.
  • Sightings: Users have the possibility to add observations to vulnerabilities with different types of sightings, such as: seen, exploited, not exploited, confirmed, not confirmed, patched, and not patched.
  • Comments: Ability to add, review and share comments on vulnerability advisories.
  • Bundles: Possibility to create bundles of vulnerability advisories with a description.
  • RSS/Atom: An extensive RSS and Atom support for vulnerabilities and comments.
  • EPSS: Integration of the Exploit Prediction Scoring System.
  • Track vulnerabilities with your custom product watch lists and receive email notifications.

For more information, refer to the user manual or the documentation.

Sources and Feeders

  • CISA Known exploited vulnerability DB (via HTTP).
  • NIST NVD CVE importer (via API 2.0), Fraunhofer FKIE NVD.
  • CVEProject - cvelist (via git submodule repository).
  • Cloud Security Alliance - GSD-Database (via git submodule repository).
  • GitHub Advisory Database (via git submodule repository).
  • PySec Advisory Database (via git submodule repository).
  • OpenSSF Malicious Packages (via git submodule repository)
  • Additional sources via CSAF including CERT-Bund, CISA, Cisco, nozominetworks, Open-Xchange, Red Hat, Sick, Siemens, NCSC-NL, Microsoft.
  • VARIoT IoT vulnerabilities database.
  • JVN iPedia, Japan database of vulnerability countermeasure information.
  • Tailscale security bulletins.
  • CWE (Common Weakness Enumeration) and CAPEC (Common Attack Pattern Enumeration and Classification)

Vulnerability-Lookup is a public service operated by CIRCL.

Public Web API of Vulnerability-Lookup

The HTTP API outputs JSON and described as an OpenAPI. The API is fully documented at the following location https://vulnerability.circl.lu/api. No authentication is required for the public exposed functions and authentication is required for the specific user API requests such as adding comments, bundle and user management. For more documentation about the project, https://www.vulnerability-lookup.org is the official webpage of the project.

Browse vendor and product

To get a JSON with all the vendors:

curl https://vulnerability.circl.lu/api/browse

To get a JSON with all the products associated to a vendor:

curl https://vulnerability.circl.lu/api/browse/microsoft

Browse CVEs per vendor/product

To get a JSON with all the vulnerabilities per vendor and a specific product:

curl https://vulnerability.circl.lu/api/search/microsoft/office

Get CVE per CVE-ID

To get a JSON of a specific CVE ID:

curl https://vulnerability.circl.lu/api/cve/CVE-2010-3333

Get the last updated CVEs

To get a JSON of the last 30 CVEs including CAPEC, CWE and CPE expansions:

curl https://vulnerability.circl.lu/api/last

Get more information about the current CVE database

To get more information about the current databases in use and when it was updated:

curl https://vulnerability.circl.lu/api/dbInfo

Do you log search queries?

Yes, we do log the search queries to debug our software and acquire statistics about software vulnerabilities trending.

Where is the source code of the Vulnerability-Lookup software?

Vulnerability-Lookup source is open source and available on GitHub and CIRCL Forge.

The original service was using cve-search source code is available on GitHub. We created Vulnerability-Lookup to facilitate multi sources and improve the performance of the service.

Is there a full dumps of the Vulnerability-Lookup sources?

You can access the full dumps per source from the Vulnerability-Lookup dumps.

Is there a library to access Vulnerability-Lookup service?

Yes, the Python library is accessible via PyVulnerabilityLookup

Feed syndication in RSS and Atom

Available feeds

Endpoint Methods Rule
bundles_bp.feed_bundles GET /bundles/feed.<string:format>[?user=<login>]
comments_bp.feed_comments GET /comments/feed.<string:format>[?user=<login>]
user_bp.feed_activity GET /user/<string:login>.<string:format>
home_bp.feed_recent GET /recent/<string:source>.<string:format>[?vulnerability=<vuln-id>]

The value of format can be rss or atom.

The value of source can be one of the following: “all”, “github”, “cvelistv5”, “nvd”, “pysec”, “gsd”, “ossf_malicious_packages”, “csaf_certbund”, “csaf_siemens”, “csaf_redhat”, “csaf_cisa”, “csaf_cisco”, “csaf_sick”, “csaf_nozominetworks”, “csaf_ox”, “variot”.

Examples

Recent vulnerabilities from all sources

$ curl https://vulnerability.circl.lu/recent/all.atom

Recent vulnerabilities from pysec

$ curl https://vulnerability.circl.lu/recent/pysec.atom
$ curl 'https://vulnerability.circl.lu/recent/cvelistv5.atom?vendor=MISP&per_page=2&page=8'
<?xml version='1.0' encoding='UTF-8'?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/rss/recent/cvelistv5/2</id>
  <title>Most recent entries from cvelistv5</title>
  <updated>2024-07-19T07:54:55.493975+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 2 recent entries.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/vuln/cve-2023-24027</id>
    <title>cve-2023-24027</title>
    <updated>2024-07-19T07:54:55.497533+00:00</updated>
    <link href="https://vulnerability.circl.lu/vuln/cve-2023-24027"/>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/vuln/cve-2022-48329</id>
    <title>cve-2022-48329</title>
    <updated>2024-07-19T07:54:55.497430+00:00</updated>
    <link href="https://vulnerability.circl.lu/vuln/cve-2022-48329"/>
  </entry>
</feed>

Recent vulnerabilities linked to a specified vulnerability

$ curl 'https://vulnerability.circl.lu/recent/all.atom?vulnerability=cve-2021-22280'
<?xml version='1.0' encoding='UTF-8'?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/rss/recent/all/10</id>
  <title>Most recent entries from all</title>
  <updated>2024-07-19T07:55:40.707915+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent entries.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/vuln/ghsa-x53h-2cjp-mwcx</id>
    <title>ghsa-x53h-2cjp-mwcx</title>
    <updated>2024-07-19T07:55:40.721682+00:00</updated>
    <link href="https://vulnerability.circl.lu/vuln/ghsa-x53h-2cjp-mwcx"/>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/vuln/gsd-2021-22280</id>
    <title>gsd-2021-22280</title>
    <updated>2024-07-19T07:55:40.721638+00:00</updated>
    <link href="https://vulnerability.circl.lu/vuln/gsd-2021-22280"/>
  </entry>
</feed>