Skip to content

Commit d5d1ad6

Browse files
new: [user-manual] New section on correlations.
1 parent f20cf72 commit d5d1ad6

File tree

6 files changed

+28
-9
lines changed

6 files changed

+28
-9
lines changed

content/_index.md

+9-3
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,13 @@ toc: false
55

66
![Logo of Vulnerability-Lookup](/images/VL-hori-coul.jpg)
77

8-
Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources,
8+
The Vulnerability-Lookup software is a powerful sharing platform to assist
9+
security teams, researchers, and system administrators in identifying and
10+
tracking vulnerabilities related to specific vendors and products.
11+
By leveraging known vulnerability databases, sightings, and configurations, the software
12+
provides users with accurate and up-to-date insights into security risks.
13+
14+
Vulnerability-Lookup facilitates quick [correlation](/user-manual/correlations) of vulnerabilities from various sources,
915
independent of vulnerability IDs, and streamlines the management of
1016
Coordinated Vulnerability Disclosure (CVD).
1117

@@ -26,17 +32,17 @@ feel free to create an account on the [the official instance](https://vulnerabil
2632

2733
## Features
2834

35+
- **Track vulnerabilities** with your custom product watch lists and receive [email notifications](/user-manual/email-notification).
2936
- **API**: A comprehensive and fast lookup API for searching vulnerabilities and identifying correlations by vulnerability identifier.
3037
- **Feeders**: Modular system to import vulnerabilities from [different vulnerability sources](/sources).
3138
- **CVD process**: Creation, edition and fork/copy of Security Advisories with the [vulnogram editor](https://github.com/Vulnogram).
3239
Support of local vulnerability source per Vulnerability-Lookup instance.
33-
- **Sightings**: Users have the possibility to add observations to vulnerabilities with different types of sightings, such as:
40+
- **Sightings**: Users have the possibility to add [observations](/user-manual/sightings) to vulnerabilities with different types of sightings, such as:
3441
*seen*, *exploited*, *not exploited*, *confirmed*, *not confirmed*, *patched*, and *not patched*.
3542
- **Comments**: Ability to add, review and share comments on vulnerability advisories.
3643
- **Bundles**: Possibility to create bundles of vulnerability advisories with a description.
3744
- **RSS/Atom**: An extensive RSS and Atom support for vulnerabilities and comments.
3845
- **EPSS**: Integration of the Exploit Prediction Scoring System.
39-
- **Track vulnerabilities** effortlessly with product watch lists and email notifications.
4046

4147
## Funding
4248

content/tools.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ A suite of sighting clients is already available to support this functionality:
2626

2727
If you want to create your own sigthing tool, it's recommended to use [PyVulnerabilityLookup](https://github.com/vulnerability-lookup/PyVulnerabilityLookup), a Python library to access Vulnerability-Lookup via its REST API.
2828

29-
More information related to the sightings can be found in the [documentation](https://www.vulnerability-lookup.org/documentation/sightings.html).
29+
More information related to the sightings can be found in the [user manual](/user-manual/sightings).
3030

3131
## Libraries to access the Vulnerability-Lookup API
3232

content/user-manual/_index.md

+2-1
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,10 @@ description: User Manual for vulnerability-lookup
44
toc: true
55
---
66

7-
The Vulnerability Lookup software is a powerful tool designed to assist security teams, researchers, and system administrators in identifying and tracking vulnerabilities related to specific vendors and products. By leveraging known vulnerability databases and configurations, the software provides users with accurate and up-to-date insights into security risks.
7+
The Vulnerability-Lookup software is a powerful tool designed to assist security teams, researchers, and system administrators in identifying and tracking vulnerabilities related to specific vendors and products. By leveraging known vulnerability databases and configurations, the software provides users with accurate and up-to-date insights into security risks.
88

99
# Index of Usage
1010

11+
- [Correlations](./correlations)
1112
- [Email notification](./email-notification)
1213
- [Sightings](./sightings)
+12
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
---
2+
title: "Correlations"
3+
description: How to use correlations in Vulnerability-Lookup
4+
toc: true
5+
---
6+
7+
## Presentation
8+
9+
10+
Vulnerability-Lookup not only retrieves vulnerability information from various sources
11+
(such as NIST, PySec, and GitHub) but also connects related vulnerabilities, exploits,
12+
affected software, sightings, and other relevant metadata (Vulnrichment, CISA KEV).

content/user-manual/email-notification/index.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: "User Manual - Email Notification"
2+
title: "Email Notification"
33
description: How to use the email notification in Vulnerability-Lookup
44
toc: true
55
---
@@ -15,7 +15,7 @@ Notifications come in both HTML and plain text, with CSV attachments detailing v
1515

1616
The notification feature is accessible from your profile menu and available only to logged-in users.
1717

18-
You can create multiple notifications, each consisting of a vendor and product definition. These definitions are derived from the known `vulnerable_configuration` and `known CPE` data of the vulnerability lookup instance.
18+
You can create multiple notifications, each consisting of a vendor and product definition. These definitions are derived from the known `vulnerable_configuration` and `known CPE` data of the Vulnerability-Lookup instance.
1919

2020
Additionally, you can specify the notification frequency, choosing between `hourly`, `daily`, or `weekly`.
2121

content/user-manual/sightings/index.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: "User Manual - Sightings"
2+
title: "Sightings"
33
description: How to use sightings in Vulnerability-Lookup
44
toc: true
55
---
@@ -49,7 +49,7 @@ To track vulnerabilities from data found on the Fediverse, you can use [`FediVul
4949

5050
[`MISPSight`](https://github.com/vulnerability-lookup/MISPSight) is a client that retrieves vulnerability observations from a [`MISP`](https://github.com/MISP/MISP) server and pushes them to a Vulnerability-Lookup instance.
5151

52-
[`NucleiVuln`](https://github.com/cedricbonhomme/NucleiVuln) is a client designed to monitor and retrieve vulnerability-related information from the [`Nuclei Git repository of templates`](https://github.com/projectdiscovery/nuclei-templates). Templates form the core of the Nuclei scanner. When a template is linked to a vulnerability, the resulting detection (observation) is classified as *confirmed*, signifying a higher level of certainty compared to the *seen* classification.
52+
[`NucleiVuln`](https://github.com/vulnerability-lookup/NucleiVuln) is a client designed to monitor and retrieve vulnerability-related information from the [`Nuclei Git repository of templates`](https://github.com/projectdiscovery/nuclei-templates). Templates form the core of the Nuclei scanner. When a template is linked to a vulnerability, the resulting detection (observation) is classified as *confirmed*, signifying a higher level of certainty compared to the *seen* classification.
5353

5454
Our tools on the Python Package Index (PyPI):
5555

0 commit comments

Comments
 (0)