cedric

joined 4 years ago
 

This release of Vulnerability-Lookup includes new features, better monitoring, improvements and fixes.

What's New

Centralized monitoring service

This feature adds log and process heartbeat reporting to a Valkey datastore, enabling centralized monitoring of Vulnerability-Lookup’s system health and its various components.
(#106)

This new feature is essential for monitoring our expanding suite of tools used to collect vulnerability-related information.

Process monitoring

Feeders monitoring

Global dashboard

It also supports our new email notification service, which alerts platform users about newly discovered vulnerabilities. Additionally, a new admin view has been introduced, allowing real-time monitoring of the collected logs.

CWE and CAPEC

The CAPEC (Common Attack Pattern Enumerations) and CWE (Common Weakness Enumeration) datasets are now accessible through the API. Check out the documentation.
(#98)

Changes

  • [API] Added a new 'since' argument to the /api/vunerability/search/<vendor>/<product> endpoint (833d799)
  • [Web] Improved administration dashboard (a732ff3, 0258b24, 04f3772)

Fixes

  • Missing description on some description from Microsoft feeds (#107)
  • Removed duplicate occurences of the string cvssV4_0 in various Jinja filters. (73c4111)
  • Few minor fixes.

πŸ“‚ To see the full rundown of the changes, users can visit the changelog on GitHub: https://github.com/vulnerability-lookup/vulnerability-lookup/releases/tag/v2.6.0

Feedback and Support

If you encounter issues or have suggestions, please feel free to open a ticket on our GitHub repository. Your feedback is invaluable to us!
https://github.com/vulnerability-lookup/vulnerability-lookup/issues/

Follow us on Fediverse/Mastodon

You can follow us on Mastodon and get real time informationa about security advisories:
https://social.circl.lu/@vulnerability_lookup/

You can star the project on GitHub:
https://github.com/vulnerability-lookup/vulnerability-lookup

Or create an account:
https://vulnerability.circl.lu/

[–] cedric@lemmy.ml 2 points 2 weeks ago

I will investigate this! Thank you!

[–] cedric@lemmy.ml 1 points 2 weeks ago (2 children)

Thank you very much!

Actually I cross-posted it because someone advised me to do this after I initially shared it on !photography@lemmy.ml . But next time I'll directly share on !photography@lemmy.world ;-)

[–] cedric@lemmy.ml 1 points 2 weeks ago

Thank you for the compliment!

And definitely, you should have a look at Pixelfed. The community is surprisingly active!

I cross-posted the post to !photography@lemmy.world . Thanks for the tip!

 

cross-posted from: https://lemmy.ml/post/25836770

Just wanted to share my Pixelfed account: @cedric@pixelfed.social

I like so much this network. A lot of awesome artists are sharing their work there. fan of the accounts @zhhz@pixelfed.social, @Alice@gram.social, @Cirillux@pixelfed.social, @Charlie@pixelfed.social, @arkadiusz@pixelfed.social, and so much more!

[–] cedric@lemmy.ml 1 points 2 weeks ago

lol, but thanks!

 

Just wanted to share my Pixelfed account: @cedric@pixelfed.social

I like so much this network. A lot of awesome artists are sharing their work there. fan of the accounts @zhhz@pixelfed.social, @Alice@gram.social, @Cirillux@pixelfed.social, @Charlie@pixelfed.social, @arkadiusz@pixelfed.social, and so much more!

 

We're excited to share the latest features designed to make vulnerability tracking even more efficient.

πŸš€ What's New

πŸ†• Email Notifications (Product Watch List)

Stay ahead with hourly, daily, or weekly alerts for new or updated vulnerabilities affecting the vendors and products you care about. Notifications come in both HTML and plain text, with CSV attachments detailing vulnerabilities, sightings, and comments. (#101)

The notification management interface

Notifications management

Future releases will allow users to create notifications by specifying just a vendor, optionally a version, and to be notified about new sightings related to a product or vulnerability.

Various email notifications

The screenshot below shows a list of notifications aggregated in an email client. It's easy to aggregate messages by product / vendor.

List of notifications

πŸ†• Fraunhofer FKIE NVD Feeder

FKIE NVD Feeder is now operating as a standalone source. (b1e86d8)

πŸ†• Sightings Import/Export

Manage your sightings via the admin interface with new import/export capabilities. (23cfed2)

πŸ†• New API Endpoint

Quickly retrieve recently added or updated vulnerabilities since a specific date for better automation and integration. (eccd34d)

πŸ› οΈ Changes

  • Harmonized pagination mechanism of the API and made it more simple to use (using page numbers instead of using offsets) (46ce344)
  • The evolution chart is now taking advantage of the pagination in order to get more data (ada62e2)
  • Added an input integer slider in order to let the user dynamically set the minimum number of sightings in the evolution table (cea65b7)
  • Implemented a function to check if a domain name exists in the block list, as defined in the website's configuration file (a2e04b3)
  • Various improvements to the home page (48cbaed)
  • log entry when a shutdown key is present on start (fd18d45)
  • Various improvements to the API

πŸ“‚ To see the full rundown of the changes, users can visit the changelog on GitHub: https://github.com/vulnerability-lookup/vulnerability-lookup/releases/tag/v2.5.0

πŸ™ Thank you very much to all the contributors and testers!

Tips

Filtering your email notifications

Notification emails from Vulnerability-Lookup include custom SMTP headers:

  • X-Mailer: Vulnerability-Lookup
  • X-Category: Security Advisory

This allows you to easily create rules or filters in your email client, as shown below. Additionally, you can set up more fine-grained rules based on the email subject.

[Email filters with SMTP headers]

Creation of a new notification

Create a new notification

Example of a notification with sightings

New notification email

New notification email with sightings

New notification email with CSV attachment for vulnerabilities and sightings

 

We are glad to announce the immediate availability of vulnerability-related observations from The Shadowserver Foundation within Vulnerability-Lookup.

This milestone wouldn’t have been possible without Piotr Kijewski. We developed a new sighting client, ShadowSight. This new client gathers vulnerability-related data directly from The Shadowserver Foundation, then reports the collected data to the Vulnerability-Lookup API as sightings.

ShadowSight leverages insights on common vulnerabilities and exploited vulnerabilities from Shadowserver’s honeypot source. Source code of ShadowSight is available:

πŸ‘‰ https://github.com/CIRCL/ShadowSight

Explore our sightings collected from this source:

The Shadowserver Foundation remains a cornerstone resource for security researchers, providing an extensive wealth of data on real-world exploits and their associated vulnerabilities, complete with daily statistics and geographical insights.

Widely used by incident response teams, security researchers, analysts, and other cybersecurity professionals, Shadowserver is recognized as a highly credible and impactful project in the cybersecurity landscape. The Shadowserver Foundation delivers particularly valuable insights into security issues, including vulnerabilities in unpatched IoT devices, various types of internet-facing services, and even services that should not be exposed to the internet.

For us, it has quickly become a reliable sources for sightings. It's also a way to diversify our sources and improve situational awareness.

πŸ”— Explore all our sighting sources (such as Mastodon, Bluesky, MISP, etc.) and tools here:

πŸ‘‰ https://www.vulnerability-lookup.org/tools/#sightings

πŸ“– References

🀝 Contribute

If you want to benefit from more features of Vulnerability-Lookup like sharing comments, bundles, or sightings, you can create an account to the instance operated by CIRCL:

πŸ‘‰ https://vulnerability.circl.lu/user/signup

Sightings correlations

Sightings

6
Vulnerability-Lookup 2.4.0 (www.vulnerability-lookup.org)
 

We’re really thrilled to unveil Vulnerability-Lookup 2.4.0!

https://www.vulnerability-lookup.org/images/news/2025/2025-01-10-Vulnerability-Lookup-2.4.0.webm

This version includes new features, new importers, improvements and fixes. The key updates are highlighted below.

πŸ” New Dashboard: Quickly access the top sighted vulnerabilities from the past month with a real-time, filterable interface.

πŸ“Š New Correlations Graph: Visualize relationships between sightings for deeper insights.

Correlations with sightings - 1 Correlations with sightings - 2

πŸ“₯ New Importers:

  • CSAF Microsoft Importer for streamlined CSAF data integration.
  • FKIE NVD Importer to incorporate FKIE NVD datasets seamlessly.

CSAF Microsoft

πŸ“‘ RSS/Atom Feeds for Sightings: Stay updated with feeds for specific CPE sightings, sorted and tailored for your needs.

πŸ‘€ GitHub Gist Sighting Tool: Introducing GistSight for tracking vulnerabilities in GitHub Gists.

πŸ’‘ Other Updates: We’ve added metadata enrichment capabilities and made significant API improvements to enhance your experience.

Discover more about Vulnerability-Lookup and its capabilities here:
https://vulnerability.circl.lu/

πŸ™ Thank you very much to all the contributors and testers!

To see the full rundown of the changes, users can visit the changelog on GitHub: https://github.com/cve-search/vulnerability-lookup/releases/tag/v2.4.0

 

Curious about the latest vulnerability trends, the year's first observations, or historical insights? Our enhanced home page on Vulnerability-Lookup (source code) now lets you filter and explore our growing dataset of sightings with ease. Simply pick the week you want and dive into the data.

Have ideas for improvements? Let us know! https://github.com/cve-search/vulnerability-lookup/issues

Of course you get these sightings via the API: https://vulnerability.circl.lu/api/

 

A cup of tea, some chocolate (as always), the warm glow of a fire in the stove, and my laptop. The magic of a cozy winter evening, with Christmas lights twinkling behind me, set the perfect mood to release version 11.2.0 of Newspipe. πŸŽ‰

If your New Year's resolution is to self-host your news reading tool, why not give Newspipe a try?

πŸ‘‰ https://github.com/cedricbonhomme/newspipe

You can check out the changelog for the latest release here:

πŸ”— https://github.com/cedricbonhomme/newspipe/releases/tag/v11.2.0

[–] cedric@lemmy.ml 1 points 2 months ago

I really like LibraryThing and uses it since about 15 years. Here's my account if you want to connect: https://www.librarything.com/profile/cedricbonhomme

 

You can find various collected status here: https://vulnerability.circl.lu/sightings/?query=bsky.app

 

Amnesty International identified how Serbian authorities used Cellebrite to exploit a zero-day vulnerability (a software flaw which is not known to the original software developer and for which a software fix is not available) in Android devices to gain privileged access to an environmental activist’s phone. The vulnerability, identified in collaboration with security researchers at Google Project Zero and Threat Analysis Group, affected millions of Android devices worldwide that use the popular Qualcomm chipsets. An update fixing the security issue was released in the October 2024 Qualcomm Security Bulletin.

 

VL-hori-coul

We’re delighted to announce the release of Vulnerability-Lookup 2.2.0, packed with enhancements, new features, and bug fixes.

What's New

  • Identity:

    • Vulnerability-Lookup now has a beautiful new logo.
  • New Statistics Namespace: The API now offers a dedicated namespace for statistics. Two new endpoints are currently available:

    • /api/stats/vulnerability/most_sighted
    • /api/stats/vulnerability/most_commented Both endpoints provide the option to return results in a Markdown table format. (7a2b8ed, d95b49c)

    You can use the API output directly to generate PDF reports:

    $ curl -s -X 'GET' 'https://vulnerability.circl.lu/api/stats/vulnerability/most_sighted?date_from=2024-07-01&output=markdown' | pandoc --from=markdown --to=pdf -o semestrial-report.pdf
    

semestrial-report

Changes

  • API Enhancements:

  • Improved Views:

    • /recent: Enhanced for greater consistency and readability.
    • /vuln: Improved display for vulnerabilities from the CVE List v5 and NVD sources. The versions of the impacted products is now displayed in a third column. (9308772, 5f9826a, f71da45, 54ad96e, e8ae16e)
    • We have enhanced the layout and accessibility of various views as part of our ongoing commitment to creating software that is inclusive and usable for everyone.
  • Documentation:

    • The documentation is now exposed by a dedicated Flask Blueprint which is serving static HTML files generated with Sphinx. Updating the documentation is possible via a simple button in the dashboard of Vulnerability-Lookup. (e27ac9f, 6f38ccf)
  • Backend:

    • Harmonization of datetime objects by ensuring that all dates use UTC-aware timestamps (8ea2554, a4defc2)
    • Gunicorn is now by default using Gevent (c79f997)

Fixes

  • Date Parameters in API:

    • The date_from and date_to parameters in the API no longer have default values. It is now the client’s responsibility to specify these values. (036ca3a)
  • CVE Lookup Endpoint:

    • We fixed the API endpoint for searching CVEs by vendor and product. (0867fac)

Funding

ngsoti-small eu_funded_en

The NGSOTI project is dedicated to training the next generation of Security Operation Center (SOC) operators, focusing on the human aspect of cybersecurity. It underscores the significance of providing SOC operators with the necessary skills and open-source tools to address challenges such as detection engineering, incident response, and threat intelligence analysis. Involving key partners such as CIRCL, Restena, Tenzir, and the University of Luxembourg, the project aims to establish a real operational infrastructure for practical training. This initiative integrates academic curricula with industry insights, offering hands-on experience in cyber ranges.

vulnerability-lookup is co-funded by CIRCL and by the European Union. Views and opinions expressed are however those of the author(s) only and do not necessarily reflect those of the European Union or ECCC. Neither the European Union nor the granting authority can be held responsible for them.

[–] cedric@lemmy.ml 2 points 3 months ago

hello,

Thank you very much for your reply and the information. I'll have a look at your links.

Actually, I am simply looking for various information about vulnerabilities. The goal is not to find announcements of vulnerabilities. This is part of the "Vulnerability Lookup" project: https://vulnerability.circl.lu/ where we gather "sightings": https://vulnerability.circl.lu/sightings

A sighting can have various sources such as: GitHub Gist, Pastebin, Fediverse, Telegram channels, etc. So yes... here my questions is about sightings from the Fediverse. For now I am happy with this simple tool to monitor the Fediverse: https://github.com/CIRCL/FediVuln

It is able to find status related to security vulnerabilities and generate sightings in our "Vulnerability Lookup" project. That's it ;-)

thank you !

 

I am looking for active Lemmy accounts about software vulnerabilities, CVEs, etc. It could be specific to GHSA, CSAF, PySEC, GSD, Pypi or whatever.

I will use it in a software vulnerability lookup projects: https://github.com/cve-search/vulnerability-lookup/ in order to create Sightings about vulnerabilities.

(it's fine as well if you can provide me Mastodon accounts. I already follow CVE program)

thank you !

[–] cedric@lemmy.ml 1 points 1 year ago

of course, you can clone/fork the repository as you want.

view more: next β€Ί