You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: content/_index.md
+9-3
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,13 @@ toc: false
5
5
6
6

7
7
8
-
Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources,
8
+
The Vulnerability-Lookup software is a powerful sharing platform to assist
9
+
security teams, researchers, and system administrators in identifying and
10
+
tracking vulnerabilities related to specific vendors and products.
11
+
By leveraging known vulnerability databases, sightings, and configurations, the software
12
+
provides users with accurate and up-to-date insights into security risks.
13
+
14
+
Vulnerability-Lookup facilitates quick [correlation](/user-manual/correlations) of vulnerabilities from various sources,
9
15
independent of vulnerability IDs, and streamlines the management of
10
16
Coordinated Vulnerability Disclosure (CVD).
11
17
@@ -26,17 +32,17 @@ feel free to create an account on the [the official instance](https://vulnerabil
26
32
27
33
## Features
28
34
35
+
-**Track vulnerabilities** with your custom product watch lists and receive [email notifications](/user-manual/email-notification).
29
36
-**API**: A comprehensive and fast lookup API for searching vulnerabilities and identifying correlations by vulnerability identifier.
30
37
-**Feeders**: Modular system to import vulnerabilities from [different vulnerability sources](/sources).
31
38
-**CVD process**: Creation, edition and fork/copy of Security Advisories with the [vulnogram editor](https://github.com/Vulnogram).
32
39
Support of local vulnerability source per Vulnerability-Lookup instance.
33
-
-**Sightings**: Users have the possibility to add observations to vulnerabilities with different types of sightings, such as:
40
+
-**Sightings**: Users have the possibility to add [observations](/user-manual/sightings) to vulnerabilities with different types of sightings, such as:
Copy file name to clipboardexpand all lines: content/tools.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ A suite of sighting clients is already available to support this functionality:
26
26
27
27
If you want to create your own sigthing tool, it's recommended to use [PyVulnerabilityLookup](https://github.com/vulnerability-lookup/PyVulnerabilityLookup), a Python library to access Vulnerability-Lookup via its REST API.
28
28
29
-
More information related to the sightings can be found in the [documentation](https://www.vulnerability-lookup.org/documentation/sightings.html).
29
+
More information related to the sightings can be found in the [user manual](/user-manual/sightings).
30
30
31
31
## Libraries to access the Vulnerability-Lookup API
Copy file name to clipboardexpand all lines: content/user-manual/_index.md
+2-1
Original file line number
Diff line number
Diff line change
@@ -4,9 +4,10 @@ description: User Manual for vulnerability-lookup
4
4
toc: true
5
5
---
6
6
7
-
The VulnerabilityLookup software is a powerful tool designed to assist security teams, researchers, and system administrators in identifying and tracking vulnerabilities related to specific vendors and products. By leveraging known vulnerability databases and configurations, the software provides users with accurate and up-to-date insights into security risks.
7
+
The Vulnerability-Lookup software is a powerful tool designed to assist security teams, researchers, and system administrators in identifying and tracking vulnerabilities related to specific vendors and products. By leveraging known vulnerability databases and configurations, the software provides users with accurate and up-to-date insights into security risks.
Copy file name to clipboardexpand all lines: content/user-manual/email-notification/index.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: "User Manual - Email Notification"
2
+
title: "Email Notification"
3
3
description: How to use the email notification in Vulnerability-Lookup
4
4
toc: true
5
5
---
@@ -15,7 +15,7 @@ Notifications come in both HTML and plain text, with CSV attachments detailing v
15
15
16
16
The notification feature is accessible from your profile menu and available only to logged-in users.
17
17
18
-
You can create multiple notifications, each consisting of a vendor and product definition. These definitions are derived from the known `vulnerable_configuration` and `known CPE` data of the vulnerability lookup instance.
18
+
You can create multiple notifications, each consisting of a vendor and product definition. These definitions are derived from the known `vulnerable_configuration` and `known CPE` data of the Vulnerability-Lookup instance.
19
19
20
20
Additionally, you can specify the notification frequency, choosing between `hourly`, `daily`, or `weekly`.
Copy file name to clipboardexpand all lines: content/user-manual/sightings/index.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: "User Manual - Sightings"
2
+
title: "Sightings"
3
3
description: How to use sightings in Vulnerability-Lookup
4
4
toc: true
5
5
---
@@ -49,7 +49,7 @@ To track vulnerabilities from data found on the Fediverse, you can use [`FediVul
49
49
50
50
[`MISPSight`](https://github.com/vulnerability-lookup/MISPSight) is a client that retrieves vulnerability observations from a [`MISP`](https://github.com/MISP/MISP) server and pushes them to a Vulnerability-Lookup instance.
51
51
52
-
[`NucleiVuln`](https://github.com/cedricbonhomme/NucleiVuln) is a client designed to monitor and retrieve vulnerability-related information from the [`Nuclei Git repository of templates`](https://github.com/projectdiscovery/nuclei-templates). Templates form the core of the Nuclei scanner. When a template is linked to a vulnerability, the resulting detection (observation) is classified as *confirmed*, signifying a higher level of certainty compared to the *seen* classification.
52
+
[`NucleiVuln`](https://github.com/vulnerability-lookup/NucleiVuln) is a client designed to monitor and retrieve vulnerability-related information from the [`Nuclei Git repository of templates`](https://github.com/projectdiscovery/nuclei-templates). Templates form the core of the Nuclei scanner. When a template is linked to a vulnerability, the resulting detection (observation) is classified as *confirmed*, signifying a higher level of certainty compared to the *seen* classification.
0 commit comments