It is our honour to announce the release of Vulnerability-Lookup 4.2.0!
This version brings a large number of new CSAF-based vulnerability advisory sources, improvements to the web interface, and several bug fixes.
What’s New
New CSAF-based sources
As the number of GNA keeps growing and the interest around the GCVE-EU initiative increases, these UI improvements and filtering
capabilities are becoming essential to efficiently explore the various available sources.
Below is the list of CSAF-based sources available by default. You can enable or disable each feeder via the
config/modules.cfg configuration file. The display in the web interface is also configurable through the
config/website.py configuration file.
- ABB
- ads-tec Industrial IT GmbH
- AUMA Riester GmbH & Co. KG
- Beckhoff Automation GmbH & Co. KG
- Bender GmbH & Co. KG
- Carlo Gavazzi Automation
- CERT-Bund
- CERT@VDE
- CISA
- Cisco
- CODESYS GmbH
- Endress+Hauser AG
- Festo SE & Co. KG
- Frauscher Sensortechnik GmbH
- Helmholz GmbH & Co. KG
- HIMA Paul Hildebrandt GmbH
- ifm electronic GmbH
- Janitza electronics GmbH
- Lenze SE
- MB connect line GmbH
- Mettler-Toledo GmbH
- Microsoft
- Miele & Cie KG
- Murrelektronik GmbH
- NCSC-NL
- Nozomi Networks
- Open-Xchange
- OpenSuse
- Pepperl+Fuchs SE
- Phoenix Contact GmbH & Co. KG
- Pilz GmbH & Co. KG
- Red Hat
- Sauter AG
- Schneider Electric
- Sick
- Siemens
- SMA Solar Technology AG
- Suse
- SWARCO TRAFFIC SYSTEMS GmbH
- Trumpf SE + Co. KG
- VARTA Storage GmbH
- WAGO GmbH & Co. KG
- Weidmueller Interface GmbH & Co. KG
- Welotec GmbH
- Wiesemann & Theis GmbH
Improvements
-
Enriched CSAF view
The generic CSAF view now includes severity, vulnerabilities, references, and acknowledgments.
d528da8 -
Enriched OSV view
Added severity and references to the generic OSV view.
65de73e -
Date published in CVE records
If known, thedatePublicfield of CVE records is now displayed.
861a082 -
Boost recent sightings enabled by default
The boost recent sightings switch is now checked by default.
4eed4c4 -
New source argument for the full-text indexer
Added asourceargument to the indexer for more targeted indexing.
d4e6e1f -
Less verbose indexing
Reduced the verbosity of the full-text search indexing process.
a563dff -
Configuration improvements
Reorganized the defaultSOURCES_TO_SHOWconfig variable and updated the samplewebsite.pyconfiguration with examples for the new configuration options.
f699400, 6e8fb6c -
Documentation updates
Various improvements to the documentation, including GCVE publication as a GNA and Known Exploited Vulnerabilities Catalogs.
58a4d83, 143f5f5, 1f6d6d3, 52c774f -
Updated Python dependencies
6e30dc2
Fixes
- Fixed incorrect vulnerability ID passed in various Jinja macros.
cf1b209 - Fixed the default product option so the form correctly re-submits its value when changing sort/order controls.
7373f8f - Suppressed spurious config warnings for disabled features.
c82e911 - Fixed a variable shadowing issue in
parse_vuln_payload()where the localsourcevariable was overriding the function parameter.
cb03721
Changelog
For the full list of changes, check the GitHub release:
Thank you to all contributors and testers!
Special thanks to Raphaël Vinot for adding the new sources.
Feedback and Support
If you encounter any issues or have suggestions, feel free to open a ticket on our GitHub repository:
Your feedback is always appreciated!
Follow Us on Fediverse/Mastodon
You can follow us on Mastodon and get real-time information about security advisories:


