Vulnerability-Lookup 2.17.0 released

Vulnerability-Lookup 2.17.0 released

October 13, 2025

 #release

We’re happy to announce the release of Vulnerability-Lookup 2.17.0 — introducing new data integrations, API improvements, and multiple security and stability fixes.

What’s New

New Sightings and Integrations

  • Public PoC Sightings — Vulnerabilities with a known public proof of concept can now be tracked directly. (#245)
  • ENISA KEV Catalog — Integration of the European Union Agency for Cybersecurity’s Known Exploited Vulnerabilities catalog adds an authoritative new layer of intelligence. (#237)
  • Metasploit Sightings — Automatically detect and list vulnerabilities referenced in Metasploit modules. (#228)
  • Sploitus RSS — Fetch exploit information from Sploitus feeds. (#227)

API Enhancements

Changes

  • Command-line tools now provide an option to delete sightings matching a regular expression. (commit 0859260)
  • Regex matching for new sightings has been tightened to require full matches, improving data consistency. (commit 71387fc)

Fixes

A major focus of 2.17.0 is hardening the platform against potential injection and logic issues. Highlights include:

For a full list of fixes and commits, see the complete changelog.


🙏 Acknowledgments

A huge thank you to Jeroen Pinoy for his thorough code review and valuable security feedback. Your contributions make the platform stronger for everyone.

Changelog

📂 For the full list of changes, check the GitHub release:
https://github.com/vulnerability-lookup/vulnerability-lookup/releases/tag/v2.17.0

🙏 A big thank you to all contributors and testers!

Feedback and Support

If you find any issues or have suggestions, please open a ticket on our GitHub repository:
https://github.com/vulnerability-lookup/vulnerability-lookup/issues/
We appreciate your feedback!

Follow Us on Fediverse/Mastodon

Stay updated on security advisories in real-time by following us on Mastodon:
https://social.circl.lu/@vulnerability_lookup/