
Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure (CVD).
Vulnerability-Lookup is also a collaborative platform where users can comment on security advisories and create bundles.
This software is under AGPLv3 license. You are welcome to copy, modify or redistribute the source code according to the Affero GPL license.
Log in or create an account to join our community of contributors and start contributing today.
You can read the official documentation as well as the documentation dedicated to the API.
A user manual is also available.
Found a bug? Report it here.

From the beginning, Vulnerability-Lookup was designed to operate independently of specific vulnerability identifiers, making it inherently compatible with the Global CVE Allocation System (GCVE).
Security advisories
Vulnerability-Lookup consolidates vulnerabilities from multiple sources.
- CVE List v5 Creative Commons Attribution 4.0 International (CC BY 4.0) 301217 vulnerabilities
- NVD Public Domain 300923 vulnerabilities
- FKIE NVD 301191 vulnerabilities
- GitHub Creative Commons Attribution 4.0 International (CC BY 4.0) 285033 vulnerabilities
- PySec Creative Commons Attribution 4.0 International (CC BY 4.0) 3221 vulnerabilities
- GSD Creative Commons Zero v1.0 Universal 335809 vulnerabilities
- OpenSSF Malicious Packages Apache License 2.0 17521 vulnerabilities
- CSAF CERT-Bund 14115 vulnerabilities
- CSAF NCSC-NL 794 vulnerabilities
- CSAF Siemens 730 vulnerabilities
- CSAF Red Hat Creative Commons Attribution 4.0 International (CC BY 4.0) 56575 vulnerabilities
- CSAF CISA 5736 vulnerabilities
- CSAF CISCO 3987 vulnerabilities
- CSAF Sick 61 vulnerabilities
- CSAF Nozomi Networks 68 vulnerabilities
- CSAF Open-Xchange 29 vulnerabilities
- CSAF Microsoft 3710 vulnerabilities
- VARIoT 41946 vulnerabilities
- JVNDB 3025 vulnerabilities
- Tailscale 31 vulnerabilities
- CSAF Suse Creative Commons Attribution 4.0 International (CC BY 4.0) 15893 vulnerabilities
- CSAF OpenSuse Creative Commons Attribution 4.0 International (CC BY 4.0) 8832 vulnerabilities
- CNVD 120773 vulnerabilities
- GNA-1 (CIRCL) 2 vulnerabilities
Sightings
This page lists the sources and tools we use to collect sightings.
We are dedicated to regularly publishing comprehensive JSON dumps of all integrated sources as open data, with updates provided on a consistent basis.
Additionally, we release AI datasets and models on Hugging Face.
Operator of the instance: Computer Incident Response Center Luxembourg (CIRCL)
Email: info@circl.lu
More information about this instance.