Software & Apps

Volume-Lookup / Olnerability-Shoverup: Vagual-lookup-facing quickly corcelability to prompts of weaknesses, and streamrin to handle coordinated degradation of the cordrability coordinated vulnerability (CVD).

The Ownerability-Loverup logo

Latest release
can
consultant
tow

Verbal-lookup is facilitating quick pleasures from different sources, which are independent of anticipated ids, and streamrines the management of coordinated coordinated coordinated to coordinated to coordinated Husrability (CVD). Violation-lookup is also a constrained platform in which users can comment on security advices and make bonds.

A chance to look-looking in round
are available to https://vulneability.circl.lu.

  • advertise the: A comprehensive and fast lookup API for finding vulnerabilities and identifying correlations by identifying vulnerability.
  • Interistant: Modular system to import vulnerals from different sources.
  • CVD process: Creature, edition and fork / copy of security advices with Vulnogram Editor. Local support is easy to vulnerable every single time load-lookup.
  • Scenery: Users tend to add observations to vulnerability to different types of scenes, such as:
    FOUND,, benefit,, was not exploited,, Confirmed,, cannot confirm,, PUBLISHEDand not patched.
  • Comments: Ability to add, review and share comments on vulnerable advals.
  • round: It is possible to create bonds in the disadvantages of a description.
  • RSS / Atoms: A wide range of RSS and Atom Support for vulnerabilities and comments.
  • Epss: Join the exploitation system.

The official documentation is available HERE.

  • The Cisa is known exploited DB vulnerability (via HTTP).
  • NIST NVD CVE IMPORT (via API 2.0), Fraunhofer fkie Nhs.
  • CVEProject – Crebist (through Git Submodule repository).
  • Cloud Security Alliance – GSD-Database (through Git Submodule repository).
  • Kamahir Advisory Database (through Git Submodule repository).
  • PYSEC Advisory Database (through Git Submodule repository).
  • Open playable package (through Git Surmodule repository)
  • Additional sources by CSAF including Cert-Bund, Cisco, Cisco, NozominectWorks, Open-XChed, Soud, Siemens, NCSC-NL, Microsoft.
  • athlete IOT Dacrerimunes database.
  • Jvn ipepiaJapan’s database in vulnerability to opponent information.
  • Ikogsecle Security bulletins.
  • Kan-uta (Typically enumeration of character) and Capec (Common Ensumeration of Attack and Classification Status)

Violation-lookup facilitates recording views of vulnerability, no matter what they have been published in a source. A suite of perspective views can be used to support this function:

If you want to make your own exploration tool, it is recommended to use PyvulnebilitylochoA Python library to access vulnerability-lookup by resting on the API.

Instructions to install available in documentation.

SUPVIEWVIEW IN FIVES-TOURKUPH ARTICKCEPICE

Ownerability-lookup free software released under “GNU Affero General License in Public V3.0”.

Copyright (c) 2023-2025 Computer Incident Response Center Luxembourg (CIRCL)
Copyright (c) 2023-2025 Alexandre Dulaunoy - https://github.com/adulau
Copyright (c) 2023-2025 Raphaël Vinot - https://github.com/Rafiot
Copyright (c) 2024-2025 Cédric Bonhomme - https://github.com/cedricbonhomme

https://repository-images.githubusercontent.com/572446652/f028f3a6-5359-4d22-b0a7-71d842b11ece

2025-02-03 09:55:00

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Check Also
Close
Back to top button