Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure (CVD).
Vulnerability-Lookup is also a collaborative platform where users can comment on security advisories and create bundles.
This software is under AGPLv3 license. You are welcome to copy, modify or redistribute the source code according to the Affero GPL license.
Log in or create an account to join our community of contributors and start contributing today.
You can read the official documentation as well as the documentation dedicated to the API.
A user manual and a FAQ are also available.
Found a bug? Report it here.
From the beginning, Vulnerability-Lookup was designed to operate independently of specific vulnerability identifiers, making it inherently compatible with the Global CVE Allocation System (GCVE).
This Vulnerability-Lookup instance is linked to GNA-1.
Security advisories
Vulnerability-Lookup consolidates vulnerabilities from multiple sources.
- CVE Program Creative Commons Attribution 4.0 International (CC BY 4.0) 349395 vulnerabilities
- NVD Public Domain 349381 vulnerabilities
- FKIE NVD 349381 vulnerabilities
- GitHub Creative Commons Attribution 4.0 International (CC BY 4.0) 331555 vulnerabilities
- PySec Creative Commons Attribution 4.0 International (CC BY 4.0) 3230 vulnerabilities
- GSD Creative Commons Zero v1.0 Universal 335809 vulnerabilities
- OpenSSF Malicious Packages Apache License 2.0 467231 vulnerabilities
- CSAF ABB 53 vulnerabilities
- CSAF CERT-Bund 9436 vulnerabilities
- CSAF CISA 3747 vulnerabilities
- CSAF CISCO 4170 vulnerabilities
- CSAF Microsoft 13971 vulnerabilities
- CSAF NCSC-NL 825 vulnerabilities
- CSAF Nozomi Networks 64 vulnerabilities
- CSAF OpenSuse Creative Commons Attribution 4.0 International (CC BY 4.0) 10452 vulnerabilities
- CSAF Open-Xchange 22 vulnerabilities
- CSAF Red Hat Creative Commons Attribution 4.0 International (CC BY 4.0) 42715 vulnerabilities
- CSAF Schneider Electric 276 vulnerabilities
- CSAF Sick 74 vulnerabilities
- CSAF Siemens 897 vulnerabilities
- CSAF Suse Creative Commons Attribution 4.0 International (CC BY 4.0) 20012 vulnerabilities
- OSV AlmaLinux MIT 3577 vulnerabilities
- OSV Haskell Creative Commons Zero v1.0 Universal 33 vulnerabilities
- OSV Ocaml Creative Commons Zero v1.0 Universal 12 vulnerabilities
- OSV OSS Fuzz Creative Commons Attribution 4.0 International (CC BY 4.0) 3895 vulnerabilities
- OSV Rustsec Creative Commons Attribution 4.0 International (CC BY 4.0) 1049 vulnerabilities
- Bitnami VulnDB Apache License 2.0 5631 vulnerabilities
- Cleanstart Apache License 2.0 815 vulnerabilities
- Drupal MIT 27 vulnerabilities
- Tailscale 36 vulnerabilities
- CERT FR Alerte 773 vulnerabilities
- CERT FR Avis 33479 vulnerabilities
- JVNDB 3228 vulnerabilities
- CNVD 129938 vulnerabilities
- FSTEC 82977 vulnerabilities
- VARIoT 41946 vulnerabilities
- CERT@VDE 2 vulnerabilities
- Phoenix Contact GmbH & Co. KG 107 vulnerabilities
- Welotec GmbH 5 vulnerabilities
- CODESYS GmbH 28 vulnerabilities
- Wiesemann & Theis GmbH 7 vulnerabilities
- MB connect line GmbH 22 vulnerabilities
- Helmholz GmbH & Co. KG 20 vulnerabilities
- Festo SE & Co. KG 18 vulnerabilities
- Pepperl+Fuchs SE 33 vulnerabilities
- Pilz GmbH & Co. KG 19 vulnerabilities
- WAGO GmbH & Co. KG 79 vulnerabilities
- ifm electronic GmbH 5 vulnerabilities
- Beckhoff Automation GmbH & Co. KG 17 vulnerabilities
- Trumpf SE + Co. KG 17 vulnerabilities
- Lenze SE 5 vulnerabilities
- Carlo Gavazzi Automation 1 vulnerability
- AUMA Riester GmbH & Co. KG 6 vulnerabilities
- Bender GmbH & Co. KG 4 vulnerabilities
- Endress+Hauser AG 19 vulnerabilities
- Frauscher Sensortechnik GmbH 4 vulnerabilities
- Miele & Cie KG 4 vulnerabilities
- Weidmueller Interface GmbH & Co. KG 16 vulnerabilities
- SMA Solar Technology AG 7 vulnerabilities
- HIMA Paul Hildebrandt GmbH 2 vulnerabilities
- Murrelektronik GmbH 1 vulnerability
- SWARCO TRAFFIC SYSTEMS GmbH 1 vulnerability
- ads-tec Industrial IT GmbH 3 vulnerabilities
- VARTA Storage GmbH 1 vulnerability
- Sauter AG 1 vulnerability
- Janitza electronics GmbH 2 vulnerabilities
- Mettler-Toledo GmbH 2 vulnerabilities
- Moksha 89 vulnerabilities
- GNA-1 (CIRCL) 75 vulnerabilities
- GNA-1337 (AHA!) 5 vulnerabilities
Sightings
This page lists the sources and tools we use to collect sightings.
This instance publishes comprehensive JSON dumps of all integrated sources as open data.
Dumps are an optional open-data convenience — not a sync mechanism. For ongoing synchronisation, use the API (since=) and the pub/sub stream. See access patterns for automated consumers for details.
AI datasets and models derived from the project are also released on Hugging Face for public use and further research.
For automated consumers
Building a scanner, external index, or other automated client? The canonical sync path is the API (use since= for incremental pulls) plus the pub/sub stream for real-time updates — please don't enumerate the API to mirror the dataset. Identify your client with a User-Agent that includes a contact URL or email.
- Access patterns for automated consumers — authoritative human-readable guidance
- /.well-known/api-policy.json — machine-readable policy (contact, sync paths, rate-limit posture, expiry)
- /llms.txt — concise agent-facing entry point
- /robots.txt — crawler policy
- /.well-known/security.txt — security contact (RFC 9116)
Operator of the instance: Computer Incident Response Center Luxembourg (CIRCL)
Email: info@circl.lu
More information about this instance.