Vulnerability-Lookup 4.2.0 released

It is our honour to announce the release of Vulnerability-Lookup 4.2.0!
This version brings a large number of new CSAF-based vulnerability advisory sources, improvements to the web interface, and several bug fixes.

What’s New

New CSAF-based sources

New sources menu folded

New sources menu unfolded

As the number of GNA keeps growing and the interest around the GCVE-EU initiative increases, these UI improvements and filtering capabilities are becoming essential to efficiently explore the various available sources.

Below is the list of CSAF-based sources available by default. You can enable or disable each feeder via the config/modules.cfg configuration file. The display in the web interface is also configurable through the config/website.py configuration file.

Improvements

Improved CSAF view

  • Enriched CSAF view
    The generic CSAF view now includes severity, vulnerabilities, references, and acknowledgments.
    d528da8

  • Enriched OSV view
    Added severity and references to the generic OSV view.
    65de73e

  • Date published in CVE records
    If known, the datePublic field of CVE records is now displayed.
    861a082

  • Boost recent sightings enabled by default
    The boost recent sightings switch is now checked by default.
    4eed4c4

  • New source argument for the full-text indexer
    Added a source argument to the indexer for more targeted indexing.
    d4e6e1f

  • Less verbose indexing
    Reduced the verbosity of the full-text search indexing process.
    a563dff

  • Configuration improvements
    Reorganized the default SOURCES_TO_SHOW config variable and updated the sample website.py configuration with examples for the new configuration options.
    f699400, 6e8fb6c

  • Documentation updates
    Various improvements to the documentation, including GCVE publication as a GNA and Known Exploited Vulnerabilities Catalogs.
    58a4d83, 143f5f5, 1f6d6d3, 52c774f

  • Updated Python dependencies
    6e30dc2

Fixes

  • Fixed incorrect vulnerability ID passed in various Jinja macros. cf1b209
  • Fixed the default product option so the form correctly re-submits its value when changing sort/order controls. 7373f8f
  • Suppressed spurious config warnings for disabled features. c82e911
  • Fixed a variable shadowing issue in parse_vuln_payload() where the local source variable was overriding the function parameter. cb03721

Changelog

📂 For the full list of changes, check the GitHub release:
https://github.com/vulnerability-lookup/vulnerability-lookup/releases/tag/v4.2.0

🙏 Thank you to all contributors and testers!

Special thanks to Raphaël Vinot for adding the new sources.

Feedback and Support

If you encounter any issues or have suggestions, feel free to open a ticket on our GitHub repository:
https://github.com/vulnerability-lookup/vulnerability-lookup/issues/
Your feedback is always appreciated!

Follow Us on Fediverse/Mastodon

You can follow us on Mastodon and get real-time information about security advisories:
https://social.circl.lu/@vulnerability_lookup/