Changelog

Versão 20.0.0 (28/03/2026)

  • Comprometer-se 187f6
    Funcionalidade
    Overhaul of the URL structure of the whole service. We change from a query string-based approach to a REST-like URL structure.

Versão 19.33.5 (12/03/2026)

Versão 19.33.4 (11/03/2026)

Versão 19.33.3 (10/03/2026)

Versão 19.33.2 (09/03/2026)

Versão 19.33.1 (08/03/2026)

  • We send the HTTP response header Content-Signal to define if and how AI-based processing of pages is allowed.

Versão 19.33.0 (02/03/2026)

Versão 19.32.2 (25/02/2026)

Versão 19.32.1 (23/02/2026)

  • Vulnerability history views indicate commits by submitters in the remark column.

Versão 19.32.0 (22/02/2026)

  • Comprometer-se 9a3dd
    Funcionalidade
    All KEV views do indicate whether there is a ransomware to be known for specific vulnerability entries.

  • All HTTP redirects on the web service are faster due to general code optimization.

Versão 19.31.0 (21/02/2026)

Versão 19.30.0 (16/02/2026)

Versão 19.29.4 (15/02/2026)

Versão 19.29.3 (13/02/2026)

Versão 19.29.2 (12/02/2026)

Versão 19.29.1 (11/02/2026)

Versão 19.29.0 (10/02/2026)

  • Comprometer-se 77f5d
    Funcionalidade
    Pedido do cliente
    Introduction of the support for CVSSv3 data by CISA as an ADP in different views (e.g. CVSSv3 overview, edit form).

  • Comprometer-se d5bc4
    Funcionalidade
    Mudança na API
    Pedido do cliente
    In API 3.86 introduction of the ADP CISA CVSSv3 vector and score which is accessible via vulnerability_cvss3_adpcisa_*.

  • CTI overviews show additional statistical data about CTI monitoring.

Versão 19.28.0 (09/02/2026)

Versão 19.27.3 (08/02/2026)

Versão 19.27.2 (06/02/2026)

  • Comprometer-se b09d3
    Correção de erros
    Fixed an issue where existing users were not able to login if their username contained a string which is blacklisted for user registration. Thanks to the user pengroot for reporting this issue.

Versão 19.27.1 (04/02/2026)

  • Improved the username validator to prevent disallowed usernames during registration.

Versão 19.27.0 (02/02/2026)

Versão 19.26.3 (30/01/2026)

  • Fixed a rare issue where vendor and product links were not aligned regarding case sensitivity.

Versão 19.26.2 (28/01/2026)

  • The recurring generation of the stats page is more efficient and informs concurrent users about the generation process.

Versão 19.26.1 (27/01/2026)

Versão 19.26.0 (26/01/2026)

Versão 19.25.3 (25/01/2026)

  • Improvement of country activity analysis accuracy shown in CTI charts.

Versão 19.25.2 (24/01/2026)

Versão 19.25.1 (23/01/2026)

  • Performance optimization for all text generation elements. Especially views with multiple descriptions profit from this.

Versão 19.25.0 (19/01/2026)

Versão 19.24.1 (13/01/2026)

  • The lookup of CWE identifiers shows the full name of items in diff views and commit items of vulnerability entries.

Versão 19.24.0 (12/01/2026)

Versão 19.23.0 (05/01/2026)

Versão 19.22.2 (04/01/2026)

Versão 19.22.1 (03/01/2026)

  • Comprometer-se b5b92
    Correção de erros
    Under certain circumstances the CVSSv4 bscores and btscores were not calculated correctly for 3rd party sources.

Versão 19.22.0 (29/12/2025)

Versão 19.21.0 (22/12/2025)

Versão 19.20.4 (20/12/2025)

Versão 19.20.3 (19/12/2025)

  • Comprometer-se 14e46
    Correção de erros
    The Previous and Next buttons of Vulnerability Relate Views link to the corresponding main entry instead to an identified match.

Versão 19.20.2 (18/12/2025)

Versão 19.20.1 (17/12/2025)

Versão 19.20.0 (15/12/2025)

Versão 19.19.2 (10/12/2025)

  • Links to CPE entries of NIST NVD do not accept wilcards for version fields anymore. A workaround makes it possible to guarantee a reliable lookup again.

Versão 19.19.1 (09/12/2025)

Versão 19.19.0 (08/12/2025)

Versão 19.18.3 (05/12/2025)

  • Editing a vulnerability entry will allow to set the field software_notaffectedlist as well.

Versão 19.18.2 (04/12/2025)

Versão 19.18.1 (02/12/2025)

  • DB structure improvement of Monoblock to improve performance of vulnerability data queries.

Versão 19.18.0 (01/12/2025)

Versão 19.17.3 (30/11/2025)

Versão 19.17.2 (28/11/2025)

Versão 19.17.1 (25/11/2025)

Versão 19.17.0 (24/11/2025)

Versão 19.16.2 (23/11/2025)

  • Comprometer-se a2e0c
    Correção de erros
    Fixed an issue where vulnerability titles contained fragments of foreign languages.

Versão 19.16.1 (18/11/2025)

Versão 19.16.0 (17/11/2025)

Versão 19.15.2 (13/11/2025)

Versão 19.15.1 (12/11/2025)

Versão 19.15.0 (10/11/2025)

Versão 19.14.1 (05/11/2025)

Versão 19.14.0 (03/11/2025)

Versão 19.13.2 (31/10/2025)

Versão 19.13.1 (30/10/2025)

Versão 19.13.0 (27/10/2025)

Versão 19.12.1 (25/10/2025)

Versão 19.12.0 (20/10/2025)

Versão 19.11.0 (13/10/2025)

Versão 19.10.0 (06/10/2025)

Versão 19.9.4 (03/10/2025)

Versão 19.9.3 (02/10/2025)

Versão 19.9.2 (01/10/2025)

Versão 19.9.1 (30/09/2025)

Versão 19.9.0 (29/09/2025)

Versão 19.8.2 (25/09/2025)

Versão 19.8.1 (24/09/2025)

Versão 19.8.0 (22/09/2025)

Versão 19.7.1 (17/09/2025)

Versão 19.7.0 (15/09/2025)

Versão 19.6.0 (08/09/2025)

Versão 19.5.3 (07/09/2025)

  • Improved the handling of version range declarations in different languages (e.g. "up to" and "prior").

Versão 19.5.2 (03/09/2025)

Versão 19.5.1 (02/09/2025)

  • If a vulnerability entry does not list products with the field software_affectedlist but the field source_certbund_products contains useful information, then the vulnerability entry will list those as affected products.

Versão 19.5.0 (31/08/2025)

Versão 19.4.3 (29/08/2025)

Versão 19.4.2 (28/08/2025)

  • Performance improvement of application request blocking of very aggressive clients.

Versão 19.4.1 (27/08/2025)

  • Introduction of a new network request limiter to block very aggressive clients.

Versão 19.4.0 (26/08/2025)

  • Comprometer-se 74b07
    Funcionalidade
    Introduction of a new application request limiter to block very aggressive clients (e.g. scraping and flooding).

  • Performance improvement of bursting request handling by the web platform.

Versão 19.3.0 (25/08/2025)

Versão 19.2.0 (20/08/2025)

Versão 19.1.0 (19/08/2025)

Versão 19.0.0 (18/08/2025)

  • Comprometer-se 3d859
    Funcionalidade
    Total overhaul of the language handling system to improve texts, descriptions, and details of the service. This will introduce the possibility to add new supported languages.

Versão 18.35.3 (17/08/2025)

Versão 18.35.2 (10/08/2025)

  • Vulnerability titles on narrow views are optimized to discard irrelevant data points.

  • Users are only listed as committers of vulnerability entries and CVE entries if their commits were approved. Unmoderated and rejected commits are not used.

Versão 18.35.1 (09/08/2025)

  • Data in the CTI view per vulnerability entry is streamlined and provides better loading times.

Versão 18.35.0 (08/08/2025)

  • Comprometer-se c9346
    Funcionalidade
    Pedido do cliente
    Vulnerability entries and RSS vulnerability feeds enhance information regarding local and remote exploitability by physical possibilities.

  • Comprometer-se 5cd4b
    Funcionalidade
    Mudança na API
    Pedido do cliente
    In API 2.46/3.83 introduction of the fields exploit_physical, exploit_local, and exploit_remote which indicate theoretical exploit capabilities.

  • Information about local and remote exploitability provide better accuracy.

Versão 18.34.0 (07/08/2025)

Versão 18.33.0 (06/08/2025)

Versão 18.32.5 (21/07/2025)

Versão 18.32.4 (18/07/2025)

Versão 18.32.3 (17/07/2025)

Versão 18.32.2 (16/07/2025)

Versão 18.32.1 (15/07/2025)

  • Database structures, dependencies, and index handling was drastically optimized, which improves the performance of many complex queries.

Versão 18.32.0 (14/07/2025)

  • In API 3.82 introduction of the fields source_certbund_wid, source_certbund_published, source_certbund_title, source_certbund_products, source_certbund_classification, source_certbund_basescore, source_certbund_tempscore, source_certbund_nopatch.

Versão 18.31.7 (13/07/2025)

  • Vulnerability entries in other languages provide better translation for certain items.

Versão 18.31.6 (11/07/2025)

  • View optimization of mail alert messages. CVSSv3 was renamed to CVSS and details at the bottom do not deploy an alignment anymore.

Versão 18.31.5 (10/07/2025)

  • Comprometer-se 620fb
    Otimização
    Pedido do cliente
    Statistical data for views with old entries were blurried for free users. This limitation is now disabled to provide better possibilities to review the coverage and quality of our data.

Versão 18.31.4 (04/07/2025)

  • In the submit view long descriptions are broken to provide better data accessibility.

Versão 18.31.3 (30/06/2025)

  • In the submit moderation overview long descriptions are broken to provide better accessibility for moderators.

Versão 18.31.2 (28/06/2025)

Versão 18.31.1 (26/06/2025)

  • Comprometer-se c485a
    Correção de erros
    Fixed an issue where CVSSv4 scores by third parties with a value of 0.0 were not shown correctly.

Versão 18.31.0 (19/06/2025)

  • Comprometer-se b25df
    Funcionalidade
    Indicator in the site footer shows which data pool is used to serve the user.

Versão 18.30.1 (15/06/2025)

Versão 18.30.0 (14/06/2025)

Versão 18.29.1 (10/06/2025)

Versão 18.29.0 (07/05/2025)

Versão 18.28.3 (06/06/2025)

Versão 18.28.2 (04/06/2025)

Versão 18.28.1 (02/06/2025)

  • Performance optimization to handle load and access peaks much better.

Versão 18.28.0 (01/06/2025)

Versão 18.27.0 (19/05/2025)

Versão 18.26.1 (14/05/2025)

Versão 18.26.0 (13/05/2025)

Versão 18.25.3 (08/05/2025)

  • Comprometer-se 8f54a
    Otimização
    Pedido do cliente
    Permabans of weak comments was too aggressive and affected users which did not violate any expectations. This issue was reported by user portal.

Versão 18.25.2 (04/05/2025)

Versão 18.25.1 (27/04/2025)

  • Improvement of automated spam detection for comment posting of vulnerability entries. Malicious users are automatically temporarily or permanently banned from postig if they violate the terms.

Versão 18.25.0 (26/04/2025)

Versão 18.24.1 (25/04/2025)

  • Comprometer-se 9d0ff
    Otimização
    Pedido do cliente
    The creation of version ranges of affected vulnerabilities does provide a more accurate upper bound value. This improves accuracy of version lists and CPE lists alike.

Versão 18.24.0 (23/04/2025)

  • Comprometer-se 93434
    Funcionalidade
    Mudança na API
    Pedido do cliente
    In API 3.77 introduction of the virtual fields source_gcve_cve and source_gcve_vuldb to highlight our activity as GCVE Numbering Authority (GNA) for the Global CVE Allocation System (GCVE).

Versão 18.23.1 (22/04/2025)

  • List of comments for vulnerability entries show the title of the entry as the tool tip of the VDB identifier.

  • List of comments for vulnerability entries show the associated CVE in a dedicated column to provide better accessibility.

Versão 18.23.0 (20/04/2025)

Versão 18.22.3 (19/04/2025)

Versão 18.22.2 (18/04/2025)

  • Vulnerability entries contain the GCVE identifier of CVE (range 0) and VulDB (range 100) if available.

Versão 18.22.1 (17/04/2025)

  • Comprometer-se 64514
    Otimização
    Pedido do cliente
    Improvement of the accuracy of the virtual field exploit_exploitability which will assess multiple other fields to determine the most reasonable value.

Versão 18.22.0 (16/04/2025)

  • Comprometer-se e0f77
    Funcionalidade
    VulDB has officially become a GCVE Numbering Authority (GNA) for the Global CVE Allocation System (GCVE). Our namespace is 100 and GCVE identifiers are derived from our VDB identifiers. GCVE identifiers are shown in the header and the source section of vulnerability entries.

Versão 18.21.6 (03/04/2025)

  • CVSS score handling of new commits in vulnerability entries is more robust.

Versão 18.21.5 (31/03/2025)

Versão 18.21.4 (30/03/2025)

  • Improvement of performance by cleaning up unused code. Especially legacy code that was used for megablock handling.

Versão 18.21.3 (29/03/2025)

Versão 18.21.2 (28/03/2025)

Versão 18.21.1 (27/03/2025)

Versão 18.21.0 (25/03/2025)

Versão 18.20.4 (20/03/2025)

  • Comprometer-se 35505
    Correção de erros
    Fixed an issue in certain CTI views were the amount of references and samples was not displayed correctly.

Versão 18.20.3 (19/03/2025)

  • Improvement of translation of the web service to provide a better wording and reflect cultural context in details.

Versão 18.20.2 (12/03/2025)

  • Improved accessibility of submit moderation to increase performance and quality.

Versão 18.20.1 (11/03/2025)

  • Performance improvements of chart views which do not include timeseries data.

Versão 18.20.0 (10/03/2025)

Versão 18.19.1 (09/03/2025)

  • Optimization of the monoblock database engine to increase performance for certain special queries.

Versão 18.19.0 (05/03/2025)

Versão 18.18.1 (02/03/2025)

  • Comprometer-se adeb6
    Correção de erros
    Fixed an issue where certain CVSSv4 CNA vector values were not stored properly during update processes. This affected updates happening between 2025-02-24 and 2025-03-01. They will be corrected in a later update run.

Versão 18.18.0 (28/02/2025)

Versão 18.17.3 (27/02/2025)

  • Fixed an issue where the renewal for an API key did not show a login prompt if an unauthenticated user accessing the feature.

Versão 18.17.2 (24/02/2025)

  • Comprometer-se 7b151
    Correção de erros
    Fixed an issue where vulnerability entries without a CVSSv4 impact were not shown correctly in overview lists and detail views.

Versão 18.17.1 (20/02/2025)

  • Comprometer-se 61977
    Correção de erros
    Fixed an issue where votes for threads of vulnerability comments were not possible on certain instances.

Versão 18.17.0 (18/02/2025)

  • Comprometer-se f2efe
    Funcionalidade
    Pedido do cliente
    We provide a statistical overview of all CWE that are used in our vulnerability database entries.

Versão 18.16.3 (17/02/2025)

  • Performance and stability optimization of vulnerability database queries.

Versão 18.16.2 (16/02/2025)

  • Vulnerability submissions with weak or wrong disclosure links get much less community points.

Versão 18.16.1 (02/02/2025)

  • Cleaning obsolete code of features like threat intelligence, vulnerability edit handling, worldmap display, and blocklist maintenance.

Versão 18.16.0 (29/01/2025)

Versão 18.15.2 (20/01/2025)

  • Comprometer-se 10aff
    Correção de erros
    Fixed an issue where complex searches regarding affected versions were not returning all associated results correctly.

Versão 18.15.1 (19/01/2025)

  • Improved handling of version data of Linux Kernel vulnerability entries.

Versão 18.15.0 (16/01/2025)

Versão 18.14.9 (15/01/2025)

  • Comprometer-se c4721
    Correção de erros
    Fixed a rare issue where certain extended search queries were not able to collect the necessary vulnerability information.

Versão 18.14.8 (13/01/2025)

Versão 18.14.7 (05/01/2025)

Versão 18.14.6 (29/12/2024)

Versão 18.14.5 (26/12/2024)

Versão 18.14.4 (23/12/2024)

  • Editing a vulnerability entry will show a small tutorial to help new users enriching existing entries.

Versão 18.14.3 (22/12/2024)

Versão 18.14.2 (21/12/2024)

Versão 18.14.1 (20/12/2024)

  • Better value analysis of vulnerability commits to establish temporary or permanent bans of malicious activities.

Versão 18.14.0 (19/12/2024)

Versão 18.13.0 (16/12/2024)

Versão 18.12.6 (12/12/2024)

Versão 18.12.5 (06/12/2024)

Versão 18.12.4 (05/12/2024)

  • Comprometer-se 6cc69
    Correção de erros
    Mudança na API
    Pedido do cliente
    In API 3.72 fixed an issue where VulDB CVSSv4 scores with a value of 0.0 were not shown properly. This affected just a few vulnerability entries. Thanks to Ryan Egbert for reporting this issue.

  • Comprometer-se 6cc69
    Correção de erros
    Mudança na API
    Pedido do cliente
    In API 3.72 fixed an issue where external CVSSv4 sources did not always contain vulnerability_cvss4_cna_bvector and vulnerability_cvss4_cna_btvector fields. Thanks to Ryan Egbert for reporting this issue.

Versão 18.12.3 (30/11/2024)

Versão 18.12.2 (28/11/2024)

Versão 18.12.1 (25/11/2024)

  • Improved generation of CSRF tokens to increase complexity of successful CSRF attacks.

Versão 18.12.0 (21/11/2024)

  • Comprometer-se 573a5
    Funcionalidade
    Introduction of a new advanced search with additional artificial intelligence capabilities. Queries are much faster and provide better accuracy.

Versão 18.11.0 (19/11/2024)

  • Comprometer-se 17636
    Funcionalidade
    Introduction of a new simple search with additional artificial intelligence capabilities. Queries are much faster and provide better accuracy.

Versão 18.10.1 (13/11/2024)

  • Comprometer-se 30cde
    Correção de erros
    Fixed an issue where under certain circumstances a listing of affected version numbers was not ordered properly.

Versão 18.10.0 (08/11/2024)

Versão 18.9.7 (06/11/2024)

  • Better duplicate action detection and processing warning during vulnerability moderation.

Versão 18.9.6 (05/11/2024)

  • Vulnerability entries with merged CPE data originating from NVD respect the different splitting methodologies to prevent data overloading between affected products.

Versão 18.9.5 (04/11/2024)

  • Vulnerability relate views show associated CVE identifiers for better analysis capabilities.

  • Performance optimization of see also data of vulnerability entries.

Versão 18.9.4 (03/11/2024)

Versão 18.9.3 (02/11/2024)

Versão 18.9.2 (01/11/2024)

  • Improved speed of collecting and displaying CTI data in vulnerability entries (requires a CTI license).

Versão 18.9.1 (29/10/2024)

Versão 18.9.0 (28/10/2024)

  • Comprometer-se ce30b
    Funcionalidade
    Mudança na API
    Pedido do cliente
    In API 3.70 introduces the Vulnerability API CTI fields cti_activity_ipaddr, cti_ioa_file, cti_ioa_library, cti_ioa_argument, cti_ioa_inputvalue, cti_ioa_pattern, cti_ioa_networkport, cti_ttp_attck, cti_ttp_cwe, and cti_ttp_capec.

Versão 18.8.3 (26/10/2024)

  • Vulnerability diff views now display up to 5 changes of an entry to provide better analysis possibilities.

Versão 18.8.2 (25/10/2024)

  • Vulnerability diff views always show up to the last 4 changes of an entry, no matter if it was the initial creation or succeeding updates.

Versão 18.8.1 (24/10/2024)

Versão 18.8.0 (23/10/2024)

Versão 18.7.1 (22/10/2024)

  • Comprometer-se 60c2a
    Correção de erros
    Pedido do cliente
    Fixed a bug where some emails were sent with wrong end-of-line characters.

Versão 18.7.0 (18/10/2024)

  • Comprometer-se 4be6a
    Funcionalidade
    Pedido do cliente
    The Cyber Threat Intelligence platform does not provide details about IP addresses. A CTI license is required to get full access.

Versão 18.6.8 (17/10/2024)

Versão 18.6.7 (14/10/2024)

  • Improvement of vulnerability titles containing complex file name structures.

Versão 18.6.6 (13/10/2024)

  • Comprometer-se 950f4
    Correção de erros
    Fixed an issue where certain products were flagged as end of life even though that was not true.

Versão 18.6.5 (12/10/2024)

  • Comprometer-se 08e5a
    Correção de erros
    Fixed an issue where CVSSv4 vectors of sources without CVSS-BT data were transponding these fields from the VulDB vector data which could lead to sometimes confusing assignments.

Versão 18.6.4 (11/10/2024)

Versão 18.6.3 (09/10/2024)

  • Within vulnerability diff views all data fields based on unix timestamps show human-readable dates as well.

Versão 18.6.2 (27/09/2024)

Versão 18.6.1 (23/09/2024)

  • Comprometer-se 419a8
    Correção de erros
    Under certain circumstances the calculation of community points was not correct which lead to a decrease in collected points. Thanks to the user guru for reporting this issue.

Versão 18.6.0 (22/09/2024)

Versão 18.5.0 (21/09/2024)

Versão 18.4.13 (20/09/2024)

  • Highlighted and tagged all main menu items that require moderation or administrative permissions.

  • Improved the view and capabilities of the manual vulnerability import feature available to vulnerability moderators.

Versão 18.4.12 (19/09/2024)

Versão 18.4.11 (17/09/2024)

Versão 18.4.10 (16/09/2024)

Versão 18.4.9 (15/09/2024)

Versão 18.4.8 (14/09/2024)

  • Listing members of the vulnerability moderation team in the vulnerability moderation view.

  • Improved action forms in the vulnerability moderation view.

Versão 18.4.7 (13/09/2024)

Versão 18.4.6 (12/09/2024)

  • Listing members of the actor moderation team in the actor import view.

Versão 18.4.5 (09/09/2024)

Versão 18.4.4 (04/09/2024)

  • History views of vulnerability entries show the username instead of the user in the chart legend.

  • History views of vulnerability entries show shortened field names in the chart legend.

  • History views of vulnerability entries list commits and approvals with 0 confidence as well in the charts.

Versão 18.4.3 (03/09/2024)

  • Comprometer-se 400a0
    Correção de erros
    Fixed an issue where vulnerability entries sometimes mention a fix timeline even though there is no fix available.

Versão 18.4.2 (31/08/2024)

Versão 18.4.1 (28/08/2024)

  • Optimized database connection handling to improve performance and decrease ressource occupancy on the servers.

Versão 18.4.0 (27/08/2024)

Versão 18.3.2 (26/08/2024)

  • Improved the handling of vulnerability titles if many names are listed as affected vendor.

Versão 18.3.1 (25/08/2024)

  • The assignment of points for submits is more strict but takes details into consideration (e.g. technical details in descriptions).

Versão 18.3.0 (24/08/2024)

Versão 18.2.0 (23/08/2024)

Versão 18.1.7 (22/08/2024)

Versão 18.1.6 (21/08/2024)

  • Vulnerability titles with unusual vulnerability classes explain those whenever possible and do not just show "unknown vulnerability" anymore.

  • The view for personal submits is improved and contains additional stats and more details.

  • Comprometer-se d167f
    Correção de erros
    Fixed a very rare issue where internal moderators were not able to debug search queries properly.

Versão 18.1.5 (20/08/2024)

Versão 18.1.4 (17/08/2024)

  • Editing a vulnerability entry will warn if a deprecated CWE value is selected.

Versão 18.1.3 (11/08/2024)

Versão 18.1.2 (10/08/2024)

  • Comprometer-se 80e03
    Correção de erros
    Fixed an issue where the recent chart on the front page was not updated properly when the service was under heavy load.

Versão 18.1.1 (09/08/2024)

Versão 18.1.0 (08/08/2024)

Versão 18.0.0 (07/08/2024)

Versão 17.29.0 (06/08/2024)

Versão 17.28.10 (02/08/2024)

Versão 17.28.9 (01/08/2024)

  • Short vulnerability titles do also show affected file names even if large quantities of GET parameters are necessary.

Versão 17.28.8 (28/07/2024)

  • Editing vulnerability entries loads forms and dependencies much faster.

Versão 17.28.7 (27/07/2024)

Versão 17.28.6 (24/07/2024)

  • CTI views of vulnerabilities are able to link the correct actor or campaign based on associated vulnerability names.

Versão 17.28.5 (23/07/2024)

  • Vulnerability history views do not have links to new data anymore if the data value is empty (e.g. an existing data point was deleted).

Versão 17.28.4 (20/07/2024)

Versão 17.28.3 (18/07/2024)

  • Indicators for CERT vulnerabilities are more prominent and link directly to the according advisory.

  • Diff views for vulnerabilities now indicate the creation of an entry and the dedicated updatesets.

  • Fixed an issue where under certain circumstances paying customers with additional free API credits were shown negative values for available API credits in their user profile.

Versão 17.28.2 (17/07/2024)

Versão 17.28.1 (16/07/2024)

  • Vulnerability history views highlight rollbacks and reverts to distinguish them from regular rejects.

Versão 17.28.0 (04/07/2024)

Versão 17.27.0 (03/07/2024)

Versão 17.26.1 (30/06/2024)

Versão 17.26.0 (29/06/2024)

  • Comprometer-se 5ccf0
    Funcionalidade
    Vulnerability views for history and diff show the count of established commits.

Versão 17.25.4 (25/06/2024)

  • Vulnerability diff views are able to show 4 instead of just 3 generations of updated collections.

  • Vulnerability history views provide optimized field names for better layouting and clarity.

Versão 17.25.3 (22/06/2024)

  • Performance optimization of the vulnerability database tables to make them smaller and faster to work with.

Versão 17.25.2 (19/06/2024)

  • Improved the structure of notification emails if a login of a new device was detected.

Versão 17.25.1 (18/06/2024)

Versão 17.25.0 (16/06/2024)

Versão 17.24.0 (14/06/2024)

Versão 17.23.0 (11/06/2024)

  • Comprometer-se 672d2
    Funcionalidade
    The reliability level of IOCs degrades over time and is better shown with the confidence indicator.

Versão 17.22.0 (09/06/2024)

  • Comprometer-se f4433
    Funcionalidade
    Vulnerability lists and vulnerability entries mentioning zero-day.cz do properly link to the source entry.

Versão 17.21.0 (08/06/2024)

  • Comprometer-se 2ecd8
    Funcionalidade
    Vulnerability list overviews with EPSS scores show a tooltip with the associated EPSS percentile value.

  • Comprometer-se 2ecd8
    Funcionalidade
    Vulnerability list overviews with revoked CVE identifiers show a tooltip with the reasoning.

Versão 17.20.1 (06/06/2024)

Versão 17.20.0 (03/06/2024)

Versão 17.19.3 (01/06/2024)

  • Performance optimization of database queries for vulnerability entries.

Versão 17.19.2 (28/05/2024)

Versão 17.19.1 (27/05/2024)

  • Commit histories of vulnerability entries flag not accepted commits and reverted commits differently.

Versão 17.19.0 (26/05/2024)

Versão 17.18.2 (18/05/2024)

  • Behavior of vulnerability submits is shown in all user profiles of community member that have made at least one vulnerability submission.

Versão 17.18.1 (15/05/2024)

  • Layout optimization of the relate table view for vulnerability entries.

Versão 17.18.0 (14/05/2024)

  • Comprometer-se 5c336
    Funcionalidade
    Introduction of the relate view for vulnerability entries which shows associated vulnerabilities based on affected elements.

Versão 17.17.4 (13/05/2024)

  • Vulnerability entries show other associated and similar entries much better.

Versão 17.17.3 (12/05/2024)

  • Updating all references to align with the new structure of the upcoming CNA Rules 4.0.

Versão 17.17.2 (10/05/2024)

  • Completing version data for known products based on historical data is improved regarding quality and performance.

Versão 17.17.1 (08/05/2024)

  • Performance improvement of historical version analysis provides a better user experience when accessing vulnerability enrtries.

Versão 17.17.0 (07/05/2024)

  • Comprometer-se c8039
    Funcionalidade
    Vulnerability entries contain the cache identifier to better associate activities to user groups.

Versão 17.16.2 (05/05/2024)

  • Vulnerability submission entries link better to the associated vulnerability entry.

  • Vulnerability submissions link to the current process step as explained in the Knowledge Base.

Versão 17.16.1 (29/04/2024)

  • Comprometer-se 6c2e6
    Otimização
    Pedido do cliente
    The CPE list is automcompleted based on historical data if a countermeasure version is known but affected versions are unknown.

Versão 17.16.0 (27/04/2024)

  • Comprometer-se 79b0d
    Funcionalidade
    Approved vulnerability submits are also published within a new RSS feed to make analysis of new vulnerability entries much easier.

Versão 17.15.1 (25/04/2024)

  • Comprometer-se 05482
    Correção de erros
    Fixed an issue where under some rare circumstances some vulnerability entries did not show the CPE strings.

Versão 17.15.0 (24/04/2024)

Versão 17.14.0 (23/04/2024)

Versão 17.13.0 (22/04/2024)

  • Comprometer-se b56ac
    Funcionalidade
    CTI views containing TTP (Tactics, Techniques, Procedures) information do also list associated CAPEC (Common Attack Pattern Enumeration and Classification) data.

Versão 17.12.0 (19/04/2024)

Versão 17.11.1 (17/04/2024)

Versão 17.11.0 (14/04/2024)

  • Comprometer-se 37e20
    Funcionalidade
    Some CTI list views show the EPSS percentile value to better assess exploiting risks for vulnerabilities.

  • All list views containing date or time values support tooltips which show how long ago an event happened.

Versão 17.10.0 (13/04/2024)

  • Comprometer-se 13074
    Funcionalidade
    All vulnerability list views associated with our work as a CVE Numbering Authority show the associated user submission to improve and simplify research capabilities.

  • In some vulnerability list views the columns EPSS and CTI were swapped to show CTI values as last data point.

Versão 17.9.1 (12/04/2024)

  • Comprometer-se 52022
    Correção de erros
    Pedido do cliente
    Fixed a rare issue where lists of versions were not created properly.

Versão 17.9.0 (09/04/2024)

Versão 17.8.1 (08/04/2024)

Versão 17.8.0 (03/04/2024)

Versão 17.7.1 (02/04/2024)

  • Comprometer-se e3042
    Otimização
    Pedido do cliente
    Availability of CPE for vulnerabilities is drastically improved as they are compiled based on historical data and different sources as well.

Versão 17.7.0 (01/04/2024)

Versão 17.6.4 (31/03/2024)

  • Performance improvement of updates of the internal EPSS data storage.

Versão 17.6.3 (30/03/2024)

Versão 17.6.2 (29/03/2024)

Versão 17.6.1 (28/03/2024)

  • Disabled delayed caching for certain views to provide better data in real-time.

Versão 17.6.0 (26/03/2024)

Versão 17.5.1 (25/03/2024)

Versão 17.5.0 (23/03/2024)

Versão 17.4.0 (21/03/2024)

  • API 3.60 introduced additional detail fields for CVSS data: _basevector and _tempvector for all, _baseseverity and _tempseverity for CVSSv2 and CVSSv3, _bseverity and _btseverity for CVSSv4.

Versão 17.3.1 (20/03/2024)

Versão 17.3.0 (19/03/2024)

Versão 17.2.0 (18/03/2024)

  • Comprometer-se b7147
    Funcionalidade
    CVSSv4 scores in vulnerability entries are clickable to learn more about the generation of such scores.

  • Comprometer-se b7147
    Funcionalidade
    CVSSv4 scores do also show the reliability level of the scoring assignment like we already do for CVSSv3 scores.

Versão 17.1.0 (17/03/2024)

  • Comprometer-se 026ac
    Funcionalidade
    Pedido do cliente
    Dedicated view for CVSSv4 scores is available. All entries in our database do support CVSS-B and CVSS-BT scores.

Versão 17.0.0 (16/03/2024)

  • Comprometer-se 357ce
    Funcionalidade
    Pedido do cliente
    Vulnerability entries display CVSSv4 scores (CVSS-B as Base and CVSS-BT as Temp). The main CVSS scores remain based on CVSSv3 until CVSSv4 is well-accepted in the industry.

Versão 16.30.6 (23/02/2024)

  • CTI data shown for vulnerability entries provides better identification of predictive and verified indicators.

Versão 16.30.5 (19/02/2024)

  • Comprometer-se c912d
    Otimização
    Mudança na API
    Pedido do cliente
    Strong performance improvement of CTI data requests within the Vulnerability API and the CTI API in general.

Versão 16.30.4 (18/02/2024)

  • Vulnerability entries that show CTI data will list countries with their proper name.

  • Performance improvement if CTI data is shown in vulnerability entries.

Versão 16.30.3 (17/02/2024)

  • Comments of vulnerability entries awaiting moderation or being rejected show more details for the posting user.

Versão 16.30.2 (16/02/2024)

Versão 16.30.1 (13/02/2024)

  • CVE fields during the editing of a vulnerability are protected if VulDB is the official CNA for that assignment.

Versão 16.30.0 (07/02/2024)

Versão 16.29.4 (06/02/2024)

Versão 16.29.3 (05/02/2024)

Versão 16.29.2 (03/02/2024)

  • Comprometer-se 90afb
    Otimização
    Pedido do cliente
    If a vulnerability submission gets accepted, the submitter will receive an email which does now contain the request to keep and maintain the attached sources to help others verify and investigate the issue.

Versão 16.29.1 (27/01/2024)

  • A new vulnerability submit which gets merged into an existing entry as a duplicate will not give community points to the submitter.

Versão 16.29.0 (26/01/2024)

Versão 16.28.4 (25/01/2024)

Versão 16.28.3 (24/01/2024)

  • Vulnerability entries show researchers as human-readable listings delimited by commas.

Versão 16.28.2 (19/01/2024)

  • CTI views with actor names are now considering special characters properly to support multi-language representation of source data.

Versão 16.28.1 (18/01/2024)

  • Improved handling of an increased amount of service requests to provide a better user experience.

Versão 16.28.0 (17/01/2024)

  • Comprometer-se a7d0e
    Funcionalidade
    Pedido do cliente
    The CTI export endpoint for IP addresses lists most recent entries for the last 24 hours by default. By adding a date in the form of YYYYmmdd it is possible to request items for a specific day.

  • Better identification of vulnerabilities with duplicate CVE assignments.

Versão 16.27.2 (16/01/2024)

Versão 16.27.1 (15/01/2024)

Versão 16.27.0 (12/01/2024)

  • Comprometer-se 124a4
    Funcionalidade
    CVEs that we reserve and publish as a CNA distinguish between identifier (finder), submitter (reporter), and commiter (analyst).

Versão 16.26.0 (26/12/2023)

  • Comprometer-se c138a
    Funcionalidade
    Vulnerability commits that were rejected or reverted show an indicator within the commit history for better identification.

Versão 16.25.1 (08/12/2023)

  • Performance improvement of internal HTTP processing to handle requests more efficient and to deliver results faster.

Versão 16.25.0 (18/11/2023)

Versão 16.24.7 (17/11/2023)

Versão 16.24.6 (09/11/2023)

Versão 16.24.5 (06/11/2023)

  • Upgrade of the database engine to provide better performance and ressource management.

Versão 16.24.4 (30/10/2023)

Versão 16.24.3 (27/10/2023)

Versão 16.24.2 (26/10/2023)

Versão 16.24.1 (21/10/2023)

Versão 16.24.0 (14/10/2023)

  • Comprometer-se 1c51a
    Funcionalidade
    Pedido do cliente
    Users with old passwords are warned that their passwords are going to expire. They are encouraged to define a new password.

  • Comprometer-se d843d
    Funcionalidade
    Old passwords expire and require a password reset via email to enforce a high level of security.

Versão 16.23.2 (12/10/2023)

  • Better handling of special characters in vulnerability titles to provide improved readability.

Versão 16.23.1 (11/10/2023)

Versão 16.23.0 (04/10/2023)

  • Comprometer-se c7f4e
    Funcionalidade
    Vulnerability entries show a dedicated list of affected version numbers as well.

Versão 16.22.10 (23/09/2023)

Versão 16.22.9 (20/09/2023)

  • Improvement of flooding and denial of service protection to guarantee an even more reliable service.

Versão 16.22.8 (17/09/2023)

  • The fields software_website_vendor and software_website_product are now auto-completed much better to provide improved data quality for less popular entries.

Versão 16.22.7 (15/09/2023)

Versão 16.22.6 (31/08/2023)

  • Comprometer-se 311c6
    Correção de erros
    Pedido do cliente
    Fixed an issue where exported CPE lists (JSON) were shown as objects instead of arrays. Reported by Dave Thornley.

Versão 16.22.5 (29/08/2023)

  • Improved handling of malicious requests to guarantee availability and responsiveness for our customers.

Versão 16.22.4 (09/08/2023)

  • Comprometer-se 1e7dc
    Correção de erros
    Sums and average data of yearly views were not calculated correctly if there was a month with zero data.

Versão 16.22.3 (03/08/2023)

  • Vulnerability data storage of source_nessus_type is much more efficient which increases performance as well.

Versão 16.22.2 (02/08/2023)

  • Better handling of obsolete links to discontinued vulnerability sources.

Versão 16.22.1 (01/08/2023)

  • Vulnerability data storage of source_vulnerabilitycenter_severity is much more efficient which increases performance as well.

Versão 16.22.0 (31/07/2023)

  • Comprometer-se 09088
    Funcionalidade
    Pedido do cliente
    Changes to the personal filter are now considered critical and as such they will inform the user about the edit via email.

Versão 16.21.7 (30/07/2023)

  • Vulnerability data storage of source_nessus_risk and source_secunia_risk is much more efficient which increases performance as well.

Versão 16.21.6 (29/07/2023)

Versão 16.21.5 (26/07/2023)

Versão 16.21.4 (24/07/2023)

Versão 16.21.3 (19/07/2023)

  • Better IP address association for verified IOC (Indicators of Compromise). This increases the accuracy of CTI analysis of vulnerability entries.

Versão 16.21.2 (17/07/2023)

Versão 16.21.1 (16/07/2023)

Versão 16.21.0 (05/07/2023)

  • Comprometer-se 0c32c
    Funcionalidade
    Sometimes CNAs assign duplicate CVEs for the same vulnerability. We do now show such duplicates to help to better understand connections between CVE entries.

Versão 16.20.3 (27/06/2023)

  • Better identification of vulnerability entries which affect products that are end-of-life. Version-specific association is now possible.

Versão 16.20.2 (26/06/2023)

  • Improvement of CTI analysis for vulnerabilities that spike within short timeframes (hours and days). The data is loaded, analyzed, and presented much faster.

Versão 16.21.2 (17/07/2023)

  • Optimization of monoblock capabilities to handle vulnerability data.

Versão 16.20.0 (13/06/2023)

Versão 16.19.0 (10/06/2023)

Versão 16.18.1 (03/06/2023)

  • Detection of commit collisions during editing of vulnerability data. Entries will be locked until an edit has been finalized.

Versão 16.18.0 (26/05/2023)

Versão 16.17.2 (23/05/2023)

  • Improved use of vulnerability names for better data matching on the web service.

Versão 16.17.1 (17/05/2023)

  • Upgraded database servers to improve performance during peak times.

Versão 16.17.0 (13/05/2023)

Versão 16.16.4 (11/05/2023)

  • Comprometer-se 0fa94
    Correção de erros
    Fixed a minor view issue with Indicator of Compromise (IOC) tables that list IP ranges.

Versão 16.16.3 (10/05/2023)

  • Comprometer-se 8f483
    Correção de erros
    Fixed an issue where sync of researcher data with the CVE stream did not happen properly under certain circumstances.

Versão 16.16.2 (05/05/2023)

Versão 16.16.1 (03/05/2023)

  • Improved intelligent matching of vendor and product definitions in all search queries, especially in multi-line fields.

Versão 16.16.0 (29/04/2023)

  • Comprometer-se eaaf4
    Funcionalidade
    Due to our intensive involvement as a CNA (CVE Numbering Authority) we have extended the main menu to access CVE details that are maintained by us very quickly.

Versão 16.15.1 (22/04/2023)

  • The discussion possibility for vulnerabilities mentions that they are intended for public exchange and not fort support queries. Use the contact form instead to approach our support team.

Versão 16.15.0 (21/04/2023)

Versão 16.14.1 (18/04/2023)

Versão 16.14.0 (17/04/2023)

  • Comprometer-se a040a
    Funcionalidade
    Added the setting to enable count information for certain views in the site title. This helps to determine how many items are listed on a page.

  • Comprometer-se 2ef13
    Correção de erros
    Fixed an issue in the overview of personal posts which did not show the name of a vulnerability entry properly.

Versão 16.13.2 (16/04/2023)

  • Changed the HTML title of vulnerability entries to use a colon instead of a pipe symbol as delimiter. Please update your parsers if you are relying on this data structure.

Versão 16.13.1 (15/04/2023)

Versão 16.13.0 (09/04/2023)

Versão 16.12.1 (02/04/2023)

Versão 16.12.0 (01/04/2023)

  • In API 3.56 sources that are not available anymore are shown with the unavailable tag which contains the reason. This helps to determine defunct companies and dead links.

  • Comprometer-se b5b18
    Funcionalidade
    Vulnerability entries indicate broken external links to help determine defunct companies and dead links.

Versão 16.11.1 (31/03/2023)

Versão 16.11.0 (23/03/2023)

Versão 16.10.3 (17/03/2023)

Versão 16.10.2 (16/03/2023)

Versão 16.10.1 (13/03/2023)

Versão 16.10.0 (11/03/2023)

  • Comprometer-se c639d
    Funcionalidade
    Pedido do cliente
    Comments of vulnerability entries will show official replies by our community team to help visitors to understand details and inner workings of our processes.

  • Comprometer-se 13ff7
    Funcionalidade
    Hovering over the time indicator of comments will show the exact time of the submission.

Versão 16.9.3 (09/03/2023)

Versão 16.9.2 (19/02/2023)

Versão 16.9.1 (16/02/2023)

  • Much better performance of the service by optimizing the partitioning of data. Especially if there are many tasks handled at the same time.

Versão 16.9.0 (15/02/2023)

Versão 16.8.0 (13/02/2023)

  • Comprometer-se 8a926
    Funcionalidade
    Mudança na API
    Pedido do cliente
    In API 3.54 the field software_managedservice is introduced to indicate products that are managed services and therefore not maintained by users.

Versão 16.7.0 (11/02/2023)

Versão 16.6.12 (03/02/2023)

Versão 16.6.11 (28/01/2023)

  • Comprometer-se 9e571
    Correção de erros
    Mudança na API
    Pedido do cliente
    Fixed an issue in the API where request for entry_timstampe_change for older entries did not return the desired amount of items.

Versão 16.6.10 (23/01/2023)

Versão 16.6.9 (22/01/2023)

Versão 16.6.8 (21/01/2023)

  • Invalid URL requests to the service are usually redirected, to point the user to the correct URL. This is now approached more consistantly.

Versão 16.6.7 (20/01/2023)

  • Performance optimization to increase responsibility for a wide variety of views.

Versão 16.6.6 (12/01/2023)

Versão 16.6.5 (11/01/2023)

Versão 16.6.4 (10/01/2023)

Versão 16.6.3 (09/01/2023)

  • Better handling of user sessions, especially if there is a lot of activities on the service.

Versão 16.6.2 (07/01/2023)

Versão 16.6.1 (04/01/2023)

Versão 16.6.0 (03/01/2023)

Versão 16.5.4 (02/01/2023)

  • Extended display of multiline quotes of vulnerabilities for software, advisories, vulnerabilities, exploits, and countermeasures.

Versão 16.5.3 (21/12/2022)

  • Comprometer-se 89dfe
    Correção de erros
    In very rare cases the derivative identification of vulnerability classes was not working.

Versão 16.5.2 (18/12/2022)

Versão 16.5.1 (17/12/2022)

Versão 16.5.0 (16/12/2022)

Versão 16.4.6 (12/12/2022)

Versão 16.4.5 (10/12/2022)

  • More performance improvement of the API for timeranges like advisory_date_start, entry_timestamp_create_start, entry_timestamp_change_start, and entry_timestamp_all_start.

Versão 16.4.4 (08/12/2022)

  • Comprometer-se fc381
    Otimização
    Mudança na API
    Pedido do cliente
    In API 3.52 performance optimization of certain queries requesting timeranges like advisory_date_start, entry_timestamp_create_start, entry_timestamp_change_start, and entry_timestamp_all_start.

Versão 16.4.3 (07/12/2022)

  • Improved handling of duplicate vulnerability entries. These are processed much faster, flagged as duplicates or even hidden under certain circumstances.

Versão 16.4.2 (05/12/2022)

Versão 16.4.1 (04/12/2022)

Versão 16.4.0 (03/12/2022)

Versão 16.3.4 (26/11/2022)

Versão 16.3.3 (25/11/2022)

Versão 16.3.2 (22/11/2022)

  • Improved coverage and flagging of software products known to be end-of-life.

Versão 16.3.1 (21/11/2022)

  • Better handling of vulnerability entries flagges as false-positives or revoked data parts. Summaries reflect the status better and overviews tag them more prominent.

Versão 16.3.0 (18/11/2022)

  • Comprometer-se 085b7
    Funcionalidade
    Additional links to the internal knowledge base and external sources available in vulnerability summaries and descriptions. This makes research a lot faster, easier, and more comfortable.

Versão 16.2.0 (08/11/2022)

Versão 16.1.1 (07/11/2022)

  • Comprometer-se 21a87
    Correção de erros
    Pedido do cliente
    Fixed a bug where some searches for CPE strings were not working properly.

Versão 16.1.0 (31/10/2022)

  • Comprometer-se 62218
    Funcionalidade
    Mudança na API
    Pedido do cliente
    Introduction of the fields software_license_type and software_license_name to better understand licensing and support coverage of an affected product. These are shown in vulnerability entries and since API 3.50.

Versão 16.0.3 (20/10/2022)

Versão 16.0.2 (19/10/2022)

  • Comprometer-se df7bf
    Correção de erros
    Vulnerability entries without the definition of software_version but with a definition of countermeasure_upgrade_version will show this information properly in the document title.

Versão 16.0.1 (18/10/2022)

Versão 16.0.0 (15/10/2022)

  • Comprometer-se 30f76
    Funcionalidade
    Pedido do cliente
    The vulnerability data team is taking advantage of the new source monitoring modules. An advanced artificial intelligence enumerates different sources to determine new vulnerabilities or additional details. If such are found, they are added to the submission queue and will be reviewed by the moderation team. This will increase coverage, processing speed, and data quality of vulnerability entries drastically.

Versão 15.5.6 (10/10/2022)

Versão 15.5.5 (07/10/2022)

  • Optimization of the user menu as shown on devices with smaller screens.

Versão 15.5.4 (06/10/2022)

Versão 15.5.3 (30/09/2022)

  • Comprometer-se 53399
    Correção de erros
    Mudança na API
    Pedido do cliente
    In API 3.48 fixed an issue for the field parameter where only old notations of vulnerability_cvss3_basevector_vuldb and vulnerability_cvss3_tempvector_vuldb instead also of vulnerability_cvss3_vuldb_basevector and vulnerability_cvss3_vuldb_tempvector were supported.

  • In API 1.16/2.34/3.49 a more graceful handling of too many definitions in the fields parameter got established. If there are too many fields defined, only the first ones will be used and the others silently ignored.

Versão 15.5.2 (28/09/2022)

Versão 15.5.1 (25/09/2022)

Versão 15.5.0 (23/09/2022)

Versão 15.4.1 (20/09/2022)

  • Improved the declaration of impacts within description and summaries of vulnerabilities.

Versão 15.4.0 (19/09/2022)

Versão 15.3.11 (18/09/2022)

Versão 15.3.10 (15/09/2022)

  • Better memory handling of the service to improve responsiveness of queries and views.

Versão 15.3.9 (14/09/2022)

Versão 15.3.8 (11/09/2022)

  • Comprometer-se b4aec
    Correção de erros
    Fixed an issue where empty CWE data was shown in vulnerability entries. This was just an interface error on the web frontend.

Versão 15.3.7 (08/09/2022)

  • Comprometer-se e5ba5
    Correção de erros
    Pedido do cliente
    Fixed an issue with the RSS feeds where certain special characters in the title element lead to XML validation errors. Reported by Calvin Mende.

Versão 15.3.6 (07/09/2022)

Versão 15.3.5 (06/09/2022)

Versão 15.3.4 (05/09/2022)

Versão 15.3.3 (02/09/2022)

Versão 15.3.2 (30/08/2022)

Versão 15.3.1 (29/08/2022)

Versão 15.3.0 (27/08/2022)

  • Comprometer-se 13bc6
    Funcionalidade
    Pedido do cliente
    Vulnerability entries show multiple CWE if available. In this case they are listed in descending order of accuracy.

Versão 15.2.3 (19/08/2022)

  • Vulnerability entries flagged as false-positive are shown with this tag in lists (e.g. overview, search).

Versão 15.2.2 (17/08/2022)

  • Another improvement of entropy of the CSRF token generation for critical forms.

Versão 15.2.1 (14/08/2022)

  • In API 3.46 he virtual fields advisory_reportconfidence, exploit_exploitability, countermeasure_remediationlevel provide better data accurary to improve data quality.

Versão 15.2.0 (11/08/2022)

  • Comprometer-se c5cd8
    Funcionalidade
    Mudança na API
    Pedido do cliente
    In API 3.45 the Vulnerability API is able to show additional CTI information by enabling cti=1 within requests. This is possible for free accounts, commercial accounts and enterprise accounts with the CTI option enabled. The real-time availability of the data introduces some increased round trip times for such queries.

Versão 15.1.2 (09/08/2022)

Versão 15.1.1 (12/07/2022)

  • Fixed an issue where vulnerabilities with product versions ending with .x wildcards were handled inapprorpiately.

Versão 15.1.0 (08/07/2022)

  • Comprometer-se 5134e
    Funcionalidade
    Pedido do cliente
    Certain views contain a column listing the latest EPSS (Exploit Prediction Scoring System) values for vulnerabilities.

Versão 15.0.0 (05/07/2022)

Versão 14.27.1 (29/06/2022)

  • Listing of important identifiers of vulnerabilities were optimized to provide better searchability.

Versão 14.27.0 (24/06/2022)

  • Comprometer-se ab1f7
    Funcionalidade
    English vulnerability descriptions explain the vulnerability classes according to the CWE definitions.

Versão 14.26.6 (23/06/2022)

  • Improved the support for less popular CWE classes to provide better identification capabilities of exotic vulnerabilities.

Versão 14.26.5 (16/06/2022)

  • Faster synchronization of EPSS (Exploit Prediction Scoring System) data to increase confidence of predictions.

Versão 14.26.4 (11/06/2022)

  • Improved version listing for releases using letters in version numbering (e.g. OpenSSL).

Versão 14.26.3 (10/06/2022)

Versão 14.26.2 (07/06/2022)

Versão 14.26.1 (02/06/2022)

Versão 14.26.0 (01/06/2022)

  • Comprometer-se 6b2ff
    Funcionalidade
    Pedido do cliente
    Introduction of the Exploit Prediction Scoring System which is able to predict chances of successful exploitation of vulnerabilities. Official EPSS data is kept in sync and shown in the vulnerability details.

  • Comprometer-se 51aab
    Funcionalidade
    Mudança na API
    Pedido do cliente
    In API 2.32/3.43 introduced the fields exploit_epss_score and exploit_epss_percentile which provide live data of EPSS (Exploit Prediction Scoring System) to predict chances of successful exploitation.

Versão 14.25.10 (31/05/2022)

  • Comprometer-se 6436a
    Correção de erros
    Fixed an issue where certain links were not correctly used in the vulnerability summaries for authenticated users. Reported by Andrea Hauser

Versão 14.25.9 (25/05/2022)

Versão 14.25.8 (23/05/2022)

  • Comprometer-se 01046
    Correção de erros
    Mudança na API
    Pedido do cliente
    In API 3.41 accessing the field software_cpe23 is possible again. Other major releases of the API were not affected. Reported by Stefan Sander.

Versão 14.25.7 (15/05/2022)

Versão 14.25.6 (12/05/2022)

Versão 14.25.5 (11/05/2022)

Versão 14.25.4 (10/05/2022)

Versão 14.25.3 (06/05/2022)

Versão 14.25.2 (04/05/2022)

Versão 14.25.1 (03/05/2022)

Versão 14.25.0 (02/05/2022)

Versão 14.24.1 (29/04/2022)

Versão 14.24.0 (27/04/2022)

  • Comprometer-se 91fce
    Funcionalidade
    Mudança na API
    Pedido do cliente
    In API 3.40 using the parameter format=csv makes it possible to output vulnerability data as CSV. Not all request types are supported, not all fields are included, and API header information is not part of the output.

Versão 14.23.1 (25/04/2022)

Versão 14.23.0 (24/04/2022)

Versão 14.22.0 (21/04/2022)

Versão 14.21.2 (20/04/2022)

  • Comprometer-se 1ca57
    Otimização
    Pedido do cliente
    Alerts sent via email use asterisks to prevent Microsoft Outlook from deleting newlines.

  • Alerts sent via email refer to entries with the new format VDB-1234 instead of the old format ID 1234.

  • Switched symbols used in the community activity stream from emoji to a dedicated font to provide better reliability on different platforms.

Versão 14.21.1 (19/04/2022)

  • Certain elements on the frontpage use additional icons to visualize data sources.

Versão 14.21.0 (16/04/2022)

Versão 14.20.9 (14/04/2022)

Versão 14.20.8 (13/04/2022)

Versão 14.20.7 (11/04/2022)

  • Performance optimization of certain filtered views used by the CNA team.

  • Comprometer-se 45617
    Correção de erros
    Pedido do cliente
    The autocomplete feature for versioning of certain products was not able to finalize the output. Reported by user lywand

Versão 14.20.6 (09/04/2022)

Versão 14.20.5 (08/04/2022)

Versão 14.20.4 (01/04/2022)

Versão 14.20.3 (29/03/2022)

Versão 14.20.2 (28/03/2022)

Versão 14.20.1 (26/03/2022)

Versão 14.20.0 (21/03/2022)

Versão 14.19.0 (20/03/2022)

Versão 14.18.4 (19/03/2022)

Versão 14.18.3 (15/03/2022)

  • Scrollbars of elements provide better styling to improve user experience, especially on smaller screens.

Versão 14.18.2 (14/03/2022)

Versão 14.18.1 (10/03/2022)

  • Improved layout of the changelog items to provide better visibility.

  • Timelines in vulnerability entries do always link to countermeasures if patch or upgrade URLs are known.

  • Comprometer-se 91b01
    Correção de erros
    Some links to countermeasures were clickable but still threw a 404 even though the requested resources were available. Reported by user mael

Versão 14.18.0 (09/03/2022)

  • Comprometer-se 72d69
    Funcionalidade
    Items listed in legends of charts are clickable to allow quick drilldowns.

  • Comprometer-se a7e66
    Correção de erros
    Certain pie charts did not reflect the correct number of known matches.

Versão 14.17.5 (07/03/2022)

  • A better layout helps vulnerability moderators to identify priority entries in the submission queue.

Versão 14.17.4 (01/03/2022)

  • Comprometer-se 23a47
    Correção de erros
    In certain views the generation of timeline graphs was not possible if the advisory_date of an entry has been changed to another year.

Versão 14.17.3 (28/02/2022)

Versão 14.17.2 (27/02/2022)

Versão 14.17.1 (25/02/2022)

  • Icon text in the submenu allows hyphenation to optimize the view on narrow screens.

  • Charts for timespans are optimized to zoom into the timeframe whenever possible and useful.

Versão 14.17.0 (23/02/2022)

  • Comprometer-se f8d99
    Funcionalidade
    The applicable copyright license is shown in the footer of the page.

Versão 14.16.1 (22/02/2022)

  • Table listings with narrow columns provide better spacing to fit the content.

Versão 14.16.0 (21/02/2022)

  • Comprometer-se 93389
    Funcionalidade
    Pedido do cliente
    The CTI views do allow for drilldown of IP addresses as IoC (Indicator of Compromise).

  • Comprometer-se 9e1e2
    Correção de erros
    Pedido do cliente
    Listing of version numbers ranging back to 0.x might have contained version 0.0. This is usually wrong and got fixed. Thanks to Cheek Yang of xFusion Digital Technologies for making us aware of this issue.

Versão 14.15.1 (20/02/2022)

Versão 14.15.0 (18/02/2022)

  • Comprometer-se 4da51
    Funcionalidade
    Pedido do cliente
    Custom CTI analysis contains IOC (Indicator of Compromise), TTP (Tactics, Techniques, Procedures) and IOA (Indicator of Attack) as well.

Versão 14.14.0 (17/02/2022)

  • Comprometer-se 52552
    Funcionalidade
    Pedido do cliente
    The CTI view for countries lists popular TTP (Tactics, Techniques, Procedures) and IOA (Indicator of Attack) as well.

Versão 14.13.4 (09/02/2022)

Versão 14.13.3 (08/02/2022)

Versão 14.13.2 (31/01/2022)

Versão 14.13.1 (30/01/2022)

  • Performance optimization of APT actor association charts during generation.

Versão 14.13.0 (28/01/2022)

Versão 14.12.1 (27/01/2022)

  • In API 1.13/2.29/3.37 provoking 405 Unknown request type errors again is only possible after a few minutes. This prevents flooding the API access log and prevents misconfigured clients from exhausting the API credits quickly.

Versão 14.12.0 (24/01/2022)

Versão 14.11.8 (21/01/2022)

  • Improvement of URL validation during moderation to prevent incorrect values.

Versão 14.11.7 (15/01/2022)

  • Improved security of SPF and DMARC. Recommendations were submitted by Nikhil Rane.

  • Improved security and usability of signup procedure and passwort recovery procedure. Recommendations were submitted by Nikhil Rane.

Versão 14.11.6 (14/01/2022)

  • Layout optimization of certain forms using additional information or CAPTCHA elements.

Versão 14.11.5 (13/01/2022)

Versão 14.11.4 (12/01/2022)

Versão 14.11.3 (11/01/2022)

  • Performance and memory optimization of certain queries which do not need CTI data to be shown.

Versão 14.11.2 (07/01/2022)

Versão 14.11.1 (05/01/2022)

Versão 14.11.0 (04/01/2022)

  • Comprometer-se bfdcd
    Funcionalidade
    Pedido do cliente
    It is possible to do a CTI analysis of dedicated entries to show activities, interest distribution, active actors, and indicators of compromise. This feature requires an additional CTI license.

Versão 14.10.2 (28/12/2021)

  • Comprometer-se f43dd
    Correção de erros
    Users hiding their profile were not able to show their own profile. This has been fixed.

Versão 14.10.1 (24/12/2021)

  • Comprometer-se 8b772
    Otimização
    Pedido do cliente
    Scrollbars on Mozilla browsers are styled or even hidden whenever useful to provide a better user experience on smaller screens.

Versão 14.10.0 (23/12/2021)

Versão 14.9.0 (22/12/2021)

Versão 14.8.1 (18/12/2021)

Versão 14.8.0 (17/12/2021)

  • Comprometer-se bb5ae
    Funcionalidade
    Pedido do cliente
    Language support for Russian (ru). This includes basic parts of the web site and vulnerability details.

Versão 14.7.0 (14/12/2021)

Versão 14.6.0 (12/12/2021)

Versão 14.5.0 (11/12/2021)

Versão 14.4.1 (10/12/2021)

Versão 14.4.0 (09/12/2021)

Versão 14.3.1 (08/12/2021)

  • New multi-threading handling of expensive database queries increases the performance of many requests and views.

Versão 14.3.0 (07/12/2021)

Versão 14.2.0 (06/12/2021)

Versão 14.1.3 (05/12/2021)

  • Databox with vulnerability of the day uses better search box for increased accessibility.

Versão 14.1.2 (04/12/2021)

Versão 14.1.1 (03/12/2021)

Versão 14.1.0 (02/12/2021)

  • Comprometer-se e68e7
    Funcionalidade
    Some chart types, especially pie charts and doughnut charts, show an additional legend to provide better visibility of data.

  • Comprometer-se 2fa71
    Otimização
    Pedido do cliente
    The responsiveness of the user menu on the side behaves better on smaller screens.

  • External URLs to MITRE CVE link to the new cve.org domain.

Versão 14.0.1 (01/12/2021)

Versão 14.0.0 (30/11/2021)

  • Comprometer-se bb919
    Funcionalidade
    Pedido do cliente
    Relaunch of the service with a new layout and extended app capabilities.

Versão 13.41.1 (11/11/2021)

  • Vulnerability entries without user comments show the requested languages, even if English was the only language selected.

  • Layout of the login recommendation to comment on vulnerability entries was optimized.

Versão 13.41.0 (10/11/2021)

  • Comprometer-se 0c2ae
    Funcionalidade
    Pedido do cliente
    Commercial customers using credit card as payment method are able to show their last invoices online. Invoices and receipts can be downloaded from our partner Stripe. All documents are hosted externally. VulDB does not store credit card details, invoices nor receipts.

Versão 13.40.1 (09/11/2021)

Versão 13.40.0 (08/11/2021)

Versão 13.39.1 (06/11/2021)

  • Comprometer-se 1c057
    Correção de erros
    Pedido do cliente
    Under rare circumstances a timeframe request did contain entries outside the defined timeframe. Additional validation has been introduced to prevent this effect. Reported by user guliang

Versão 13.39.0 (03/11/2021)

  • Comprometer-se 02e0b
    Funcionalidade
    Pedido do cliente
    Language support for Portuguese (pt). This includes basic parts of the web site and vulnerability details.

Versão 13.38.0 (01/11/2021)

  • Comprometer-se 49840
    Funcionalidade
    Pedido do cliente
    Enterprise customers are able to create a custom dashboard with individual charts and lists to maintain their professional vulnerability management.

Versão 13.37.0 (29/10/2021)

  • Comprometer-se ecf36
    Funcionalidade
    External links in vulnerability entries known to be not working anymore are flagged as 404 Not Found.

  • In the commit view the column Moderated is renamed to Accepted to indicate the moment a change was approved.

Versão 13.36.2 (27/10/2021)

  • Most recent entries on the frontpage are listed faster and with more details right after the creation of a new entry.

Versão 13.36.1 (26/10/2021)

  • Comprometer-se fe47a
    Otimização
    Pedido do cliente
    Overview pages with an huge number of entries are not limited anymore.

Versão 13.36.0 (25/10/2021)

Versão 13.35.1 (19/10/2021)

  • Optimization of summaries and descriptions in certain languages to better consider the expected vulnerability class of an entry.

Versão 13.35.0 (09/10/2021)

Versão 13.34.0 (15/09/2021)

  • In API 2.26/3.34 information about bug bounty organization vulnerability_bugbounty_organization, price vulnerability_bugbounty_price, and payout date vulnerability_bugbounty_payoutdate were introduced.

Versão 13.33.1 (13/09/2021)

Versão 13.33.0 (10/09/2021)

Versão 13.32.4 (07/09/2021)

Versão 13.32.3 (06/09/2021)

  • Ranges between versions and up to versions are shown with even higher level of accuracy. This includes titles and summaries as well.

Versão 13.32.2 (02/09/2021)

Versão 13.32.1 (31/08/2021)

Versão 13.32.0 (27/08/2021)

Versão 13.31.0 (26/08/2021)

Versão 13.30.1 (25/08/2021)

Versão 13.30.0 (24/08/2021)

Versão 13.29.3 (23/08/2021)

  • Vulnerability comments in a specific language are only shown if the site is loaded in that language.

Versão 13.29.2 (22/08/2021)

Versão 13.29.1 (21/08/2021)

  • Eliminated all links to SecurityFocus vulnerability database as they discontinued the service. Thank you for all your contributions to the cyber security industry!

  • Re-ordered the listing of external resourced within the reference tables.

  • New color scheme for yearly comparison of CVSS base and temp vectors.

Versão 13.29.0 (19/08/2021)

Versão 13.28.11 (18/08/2021)

  • Announcement banner is shown only if necessary to provide the maximum of space.

  • Time-only statements are now always shown depending on the selected request language.

Versão 13.28.10 (17/08/2021)

  • Vulnerability entries hide header tooltip icons as soon as the screen is too small to read them.

Versão 13.28.9 (16/08/2021)

Versão 13.28.8 (15/08/2021)

  • Better performance thanks to optimized database index for several different tables.

Versão 13.28.7 (08/08/2021)

  • Comprometer-se 0fc46
    Correção de erros
    Fixed a rare bug on the frontpage where very recent entries are not shown with all available technical details in the title.

Versão 13.28.6 (07/08/2021)

Versão 13.28.5 (05/08/2021)

  • Optimized the capabilities of searching with CPE strings. Such searches are now much faster and more accurate.

Versão 13.28.4 (04/08/2021)

  • Comprometer-se b697e
    Otimização
    Pedido do cliente
    Aligned the listing of entry_changelog to show the field name of vulnerabilitycenter_lastupdatedate correctly. This issue was reported by Fergus Nelson.

  • Comprometer-se 006fc
    Correção de erros
    Pedido do cliente
    Under certain circumstances the calculation of exploit prices was not happening. This has been fixed. This bug was reported by Fergus Nelson.

Versão 13.28.3 (02/08/2021)

  • External redirects first tested for malicious code are using HTTP status code 301 Moved Permanently instead of 302 Found.

Versão 13.28.2 (28/07/2021)

Versão 13.28.1 (27/07/2021)

Versão 13.28.0 (26/07/2021)

  • Comprometer-se 5f4e7
    Funcionalidade
    Pedido do cliente
    Language support for Arabic (ar). This includes basic parts of the web site and vulnerability details. Right-to-left is implemented whenever required.

Versão 13.27.4 (24/07/2021)

  • Current CTI scores in overviews are loaded and shown much faster which improves speed of site generation.

  • Comprometer-se 7430f
    Correção de erros
    Current CTI scores are shown in overviews in any case even if the servers are under heavy load.

  • Comprometer-se 7430f
    Correção de erros
    Current CTI scores in overviews show the correct timestamp of the last update for the most recent entries in the tooltip of the field.

Versão 13.27.3 (17/07/2021)

Versão 13.27.2 (16/07/2021)

  • Clarification of titles of privilege escalation vulnerabilities. Remote issues that require some form of authentication are shown as Privilege Escalation without mentioning of Remote. Only remote issues without authentication are shown as true Remote Privilege Escalation.

  • Comprometer-se 61142
    Correção de erros
    Mudança na API
    Pedido do cliente
    Fixed a rare bug in API 1.11/2.24/3.31 that created an associative array for software_version if the list of versions numbers contained the value 0. Thanks to Fergus Nelson for reporting this issue.

Versão 13.27.1 (15/07/2021)

Versão 13.27.0 (14/07/2021)

  • Comprometer-se cc0e3
    Funcionalidade
    Pedido do cliente
    Cyber threat intelligence events display emerging, current, and upcoming activities by actors.

  • Comprometer-se dacc3
    Correção de erros
    Fixed a bug that temp scores of CVSS vectors are not properly stored during initial entry create. This did not affect updated entries.

Versão 13.26.4 (07/07/2021)

Versão 13.26.3 (30/06/2021)

  • Reinstated linking to CVEdetails.com as they resumed adding and updating new CVEs.

Versão 13.26.2 (25/06/2021)

  • Comprometer-se 28728
    Otimização
    Mudança na API
    Pedido do cliente
    The Content-Type of all API responses is changed to application/json; charset=utf-8. This is not a change in the API itself which is why the version number of the API endpoints is not incremented.

Versão 13.26.1 (24/06/2021)

  • Comprometer-se 0d89b
    Otimização
    Mudança na API
    Pedido do cliente
    The official vulnerability API endpoint is located at /?api and will redirect faulty URLs and GET parameters. Microsoft Power Apps did not respect this URL structure and changed the query string to a parameter tuple with an empty value. Our API endpoint redirected to the correct URL but Power Apps is not capable of following such HTTP redirects. This issue got fixed as Power Apps is now allowed to access the API endpoint even though the request URL format is not entirely correct.

Versão 13.26.0 (18/06/2021)

Versão 13.25.3 (16/06/2021)

Versão 13.25.2 (15/06/2021)

Versão 13.25.1 (14/06/2021)

Versão 13.25.0 (11/06/2021)

Versão 13.24.1 (09/06/2021)

Versão 13.24.0 (08/06/2021)

Versão 13.23.0 (07/06/2021)

Versão 13.22.1 (04/06/2021)

  • Timelines indicating activities show the so called activity index instead of the generic entries label.

  • Bar charts showing exploit prives use exploit instead of the generic entries label.

Versão 13.22.0 (31/05/2021)

Versão 13.21.0 (26/05/2021)

  • Comprometer-se edf52
    Funcionalidade
    Pedido do cliente
    Language support for Japanese (jp). This includes basic parts of the web site and vulnerability details.

Versão 13.20.4 (18/05/2021)

Versão 13.20.3 (12/05/2021)

  • Streamlined entry identifier wording on community activity stream on the frontpage.

Versão 13.20.2 (04/05/2021)

Versão 13.20.1 (02/05/2021)

  • Community activities shown on the frontpage do refer to entries with their corresponding VDB ID to increase readability.

Versão 13.20.0 (29/04/2021)

Versão 13.19.3 (28/04/2021)

Versão 13.19.2 (26/04/2021)

Versão 13.19.1 (24/04/2021)

  • Optimized load balancing, limiter, and DDoS mitigation to provide more stability for legitimate users.

Versão 13.19.0 (22/04/2021)

  • Comprometer-se a85dc
    Funcionalidade
    Pedido do cliente
    Submitted items are reviewed by an automated pre-parser to define a priority for processing by the moderation team. This increases priority for most important items and therefore improves processing speed.

Versão 13.18.0 (20/04/2021)

Versão 13.17.1 (16/04/2021)

Versão 13.17.0 (15/04/2021)

  • Comprometer-se 1ffb5
    Funcionalidade
    Pedido do cliente
    Description of CTI trigger possibilities and threshold handling to create events and reports.

  • Footer does now refer to your specific copyright and license depending whether there is a commercial, enterprise, or reseller license established.

Versão 13.16.0 (12/04/2021)

  • Comprometer-se f7832
    Funcionalidade
    Pedido do cliente
    Some users mistake their mail address as legitimate username to login. In this case a warning message informs the user about the mistake.

Versão 13.15.3 (08/04/2021)

  • Performance optimization for CTI country analysis (closed beta invite only at the moment). Time range analysis is now incremental which makes report generation much faster (especially for larger ranges).

Versão 13.15.2 (31/03/2021)

  • All listings in the personal profile do contain timestamps to make identification of single items much easier.

  • Completed some of the missing translations for French, Italian, Spanish, Polish, and Swedish.

  • Improved the handling of time format regarding country-specific definitions. The language en will show A.M. and P.M. only if the browser is also set to en-us. Otherwise the 24 hour format is used. If the language is set to fr and the browser announces fr-fr there will be the French format 12h34. The 24 hour format is also used as default for all languages without a specific definition.

Versão 13.15.1 (30/03/2021)

  • Comprometer-se d71be
    Correção de erros
    Fixed a bug where some long product names, product listings and titles did not show the product name in its entirety.

  • In API 3.26 fixed an issue where queries for advisory_date_start, entry_timestamp_create_start, entry_timestamp_change_start, and entry_timestamp_all_start did not work properly if the request value had a trailing whitespace.

Versão 13.15.0 (29/03/2021)

  • The personal API history does show the execution time for a request to help optimize queries. The column is shown as seconds and sortable.

  • Comprometer-se c4d04
    Funcionalidade
    Pedido do cliente
    Added planned features in a roadmap to announce upcoming functionality. The items shown are just suggestions and might change regarding implementation and deployment.

Versão 13.14.3 (28/03/2021)

Versão 13.14.2 (26/03/2021)

Versão 13.14.1 (25/03/2021)

  • Added a new community rank Guru which requires 5000 points to be reached. Therefore, Grand Master is not the highest rank anymore.

Versão 13.14.0 (24/03/2021)

  • Comprometer-se 434e3
    Funcionalidade
    Mudança na API
    Pedido do cliente
    Introduced API 3.24 with the new request type entry_timestamp_all_start which combines new items from entry_timestamp_create_start and updated items from entry_timestamp_change_start in a single stream.

Versão 13.13.1 (20/03/2021)

Versão 13.13.0 (17/03/2021)

Versão 13.12.0 (10/03/2021)

  • Comprometer-se 699d0
    Funcionalidade
    Pedido do cliente
    Made internal changelog public to provide full transparency for our customers. Entries earlier than 2020 just show milestones and not detailed changes.

  • Comprometer-se 43dfe
    Funcionalidade
    Added link to changelog under support in main menu and in the footer of the page.

  • Updated internal quality guidance for CVSS fields during creation of new entries based on official Microsoft disclosures.

Versão 13.11.3 (08/03/2021)

  • Updated internal quality requirements for advisory_person_name and advisory_person_nickname fields to prevent inaccurate information during daily update procedure.

Versão 13.11.2 (04/03/2021)

  • Optimized limiter to prohibit crawling of view elements by non-commercial users.

  • Limiter uses better geolocation data to prevent malicious users from changing IP addresses to slow down detection of abuse.

Versão 13.11.1 (03/03/2021)

  • Comprometer-se 09cef
    Correção de erros
    Fixed a rare German translation issue in a specific sentence of some vulnerability summaries.

Versão 13.11.0 (01/03/2021)

Versão 13.10.0 (28/02/2021)

Versão 13.9.0 (22/02/2021)

Versão 13.8.0 (04/02/2021)

  • Comprometer-se 5626b
    Funcionalidade
    Added load balancing features to handle performance peaks much better.

  • Comprometer-se 2efad
    Funcionalidade
    Enabled priority module to provide high-availability for enterprise customers.

Versão 13.7.1 (03/02/2021)

  • Optimized normalize module to improve quality assurance of vulnerability data management.

Versão 13.7.0 (01/02/2021)

  • Comprometer-se 14106
    Funcionalidade
    Initiated preparation for port of web services to PHP8. First polyfill functions tested.

Versão 13.6.1 (17/01/2021)

Versão 13.6.0 (16/01/2021)

  • Comprometer-se 960f5
    Funcionalidade
    Start of internal testing for CTI attribution module to identify APT group activities as such. Used by CTI team to create CTI alerts and infos for paying customers.

Versão 13.5.4 (09/01/2021)

  • Comprometer-se d53a8
    Otimização
    Mudança na API
    Pedido do cliente
    Changed entry_timestamp_delta behavior from 7200 to 120 to keep commit grouping much smaller. Entries updated within a short period of time will pushed into the update stream to provide the most actual data to API users.

Versão 13.5.3 (04/01/2021)

  • Performance improvement of search engine. Early dissection will speed up some specific search requests.

  • Performance improvement of monoblock engine. Compilation of entries is a bit faster under certain circumstances.

Versão 13.5.2 (23/12/2020)

  • Unordered lists in regular content to not a a maximum heigh and auto scrollbars anymore.

Versão 13.5.1 (15/12/2020)

Versão 13.5.0 (09/12/2020)

Versão 13.4.0 (08/12/2020)

Versão 13.3.0 (04/12/2020)

Versão 13.2.1 (03/12/2020)

  • Optimized signup flood protection to prevent malicious users from auto-generating community accounts.

Versão 13.2.0 (26/11/2020)

  • Comprometer-se 0cd93
    Funcionalidade
    Added new import feature for vulnerability moderators to handle custom entries and large batches of submissions.

  • Comprometer-se a4571
    Funcionalidade
    The differences in a diff view are highlighted by color to provide better visibility.

Versão 13.1.2 (13/11/2020)

Versão 13.1.1 (06/11/2020)

Versão 13.1.0 (02/11/2020)

Versão 13.0.1 (16/10/2020)

  • Optimized some indexes within the database to improve performance.

Versão 13.0.0 (09/10/2020)

  • Comprometer-se 8b201
    Funcionalidade
    Introduced new monoblock structure to provide more possibilities like commits, commit histories, etc.

Versão 12.26.1 (26/09/2020)

Versão 12.26.0 (10/09/2020)

Versão 12.25.1 (10/08/2020)

  • Optimization of browser rendering speed by adding font-display: swap to the CSS style sheet.

Versão 12.25.0 (16/05/2020)

  • Comprometer-se f6e38
    Funcionalidade
    Added an optimization banner to inform users about upcoming changes and features.

Versão 12.24.0 (13/05/2020)

  • Comprometer-se 58be3
    Funcionalidade
    New horizontal table style to make some upcoming views better readable.

Versão 12.23.5 (01/05/2020)

Versão 12.23.4 (17/04/2020)

Versão 12.23.3 (04/03/2020)

  • CVEdetails.com stopped updating their database. We keep linking old CVEs to their sites but do not do so for newer entries.

Versão 12.23.2 (10/01/2020)

  • Added validation styles for numbers, dates, emails, and urls for forms. These detect missing or wrong data before submitting a form.

Versão 12.23.1 (19/11/2019)

  • Decreased the font-size of labes from 90% to 75% for better readability.

  • Improved style and layout of tooltips for better readability.

Versão 12.23.0 (15/11/2019)

  • Comprometer-se 5c4b5
    Funcionalidade
    Load new pages with extended loading time show progress bar spinner at top of the site.

Versão 12.22.0 (09/11/2019)

Versão 12.21.0 (08/11/2019)

Versão 12.20.1 (06/11/2019)

Versão 12.20.0 (31/10/2019)

Versão 12.19.0 (13/09/2019)

  • Comprometer-se eaf94
    Funcionalidade
    Mudança na API
    Pedido do cliente
    In API 3.19 added field family entry_details_* which contain entry_details_affected, entry_details_vulnerability, entry_details_impact, entry_details_exploit, entry_details_countermeasures, and entry_details_sources.

Versão 12.18.0 (31/08/2019)

Versão 12.17.0 (26/08/2019)

Versão 12.16.0 (22/08/2019)

Versão 12.15.0 (06/07/2019)

Versão 12.14.0 (01/07/2019)

  • Comprometer-se 2fcc6
    Funcionalidade
    Pedido do cliente
    Introduction of software type categories available in the field software_type.

Versão 12.13.3 (04/06/2019)

Versão 12.13.2 (01/06/2019)

Versão 12.13.1 (27/05/2019)

  • Added loading bar on top of the page to indicate the loading of large pages.

Versão 12.13.0 (24/05/2019)

  • Comprometer-se bcb85
    Funcionalidade
    Submitting forms locks input fields and shows progress indicator.

Versão 12.12.0 (17/05/2019)

Versão 12.11.0 (08/05/2019)

  • In API 3.14 requesting dedicated CVSS fields supports the official response format (e.g. vulnerability_cvss3_vuldb_basescore) and the legacy format (e.g. vulnerability_cvss3_basescore_vuldb). The legacy format will be dropped in a future major release of the API.

Versão 12.10.1 (24/04/2019)

Versão 12.10.0 (17/04/2019)

Versão 12.9.0 (15/04/2019)

Versão 12.8.2 (10/04/2019)

  • Hovering a clickable symbol in an overview will now be indicated by the cursor as pointer.

  • Improved the layout of buttons inside text boxes (e.g. searches).

Versão 12.8.1 (01/04/2019)

Versão 12.8.0 (29/03/2019)

Versão 12.7.0 (21/03/2019)

Versão 12.6.0 (15/03/2019)

  • Comprometer-se d3ac7
    Funcionalidade
    Pedido do cliente
    Added multiple levels to the main menu to provide better accessibility to the variety of features.

  • Comprometer-se 35f3e
    Funcionalidade
    Added the possibility for buttons within textboxes (e.g. searches).

Versão 12.5.0 (08/03/2019)

Versão 12.4.0 (04/03/2019)

Versão 12.3.0 (01/03/2019)

Versão 12.2.0 (28/02/2019)

Versão 12.1.0 (25/02/2019)

  • Comprometer-se 9c6de
    Funcionalidade
    Pedido do cliente
    Symbols in overviews are clickable to provide a drilldown feature. This is true for CVSS, exploit prices, exploitability, and countermeasures.

  • Header text is now a graphical element.

Versão 12.0.4 (23/02/2019)

  • Slightly changed the colorization of remedation and exploitability levels.

Versão 12.0.3 (22/02/2019)

  • Changed the pointer behavior of certain table headers from grab to regular pointer.

Versão 12.0.2 (21/02/2019)

Versão 12.0.1 (20/02/2019)

Versão 12.0.0 (18/02/2019)

Versão 11.27.0 (15/02/2019)

Versão 11.26.0 (08/02/2019)

Versão 11.25.0 (06/02/2019)

Versão 11.24.1 (01/02/2019)

Versão 11.24.0 (18/01/2019)

Versão 11.23.0 (11/01/2019)

  • Comprometer-se dfb03
    Funcionalidade
    Mudança na API
    Pedido do cliente
    In API 3.8 VulDB CVSSv3 scores use AI-driven autocomplete based on historical data and additional sources. The field vulnerability_cvss3_vuldb_confidence indicates the confidence of the vectors.

Versão 11.22.1 (08/01/2019)

Versão 11.22.0 (01/01/2019)

Versão 11.21.0 (13/12/2018)

Versão 11.20.0 (28/10/2018)

Versão 11.19.0 (01/10/2018)

Versão 11.18.1 (20/09/2018)

Versão 11.18.0 (18/09/2018)

Versão 11.17.0 (01/09/2018)

Versão 11.16.0 (31/08/2018)

  • Comprometer-se c00a7
    Funcionalidade
    Pedido do cliente
    Introduction of CPE lists in entry views to indicate the affected products.

Versão 11.15.0 (06/08/2018)

Versão 11.14.4 (04/08/2018)

Versão 11.14.3 (03/08/2018)

Versão 11.14.2 (02/08/2018)

Versão 11.14.1 (01/08/2018)

  • Introduction of antialiasing of fonts for better readability on high-resolution displays.

Versão 11.14.0 (31/07/2018)

Versão 11.13.1 (22/07/2018)

Versão 11.13.0 (12/07/2018)

  • Comprometer-se b1af8
    Funcionalidade
    Pedido do cliente
    Added dynamic layouts for tables to hide certain columns under specific conditions. This improves the mobile view a lot.

Versão 11.12.1 (10/07/2018)

Versão 11.12.0 (06/07/2018)

Versão 11.11.3 (05/07/2018)

  • A new table wrapper optimizes how tables are shown on different screen sizes.

Versão 11.11.2 (04/07/2018)

Versão 11.11.1 (29/06/2018)

Versão 11.11.0 (28/06/2018)

Versão 11.10.1 (12/06/2018)

Versão 11.10.0 (11/06/2018)

Versão 11.9.4 (10/06/2018)

Versão 11.9.3 (08/06/2018)

Versão 11.9.2 (06/06/2018)

Versão 11.9.1 (04/06/2018)

Versão 11.9.0 (18/05/2018)

Versão 11.8.0 (15/05/2018)

Versão 11.7.1 (14/05/2018)

Versão 11.7.0 (08/05/2018)

Versão 11.6.0 (07/05/2018)

Versão 11.5.0 (01/05/2018)

Versão 11.4.0 (01/04/2018)

Versão 11.3.0 (22/03/2018)

  • Comprometer-se b90e6
    Funcionalidade
    Pedido do cliente
    Working on a proof-of-concept to use Alexa as a gateway to work with vulnerability data.

Versão 11.2.3 (17/02/2018)

  • Introduction of a container element to have more flexibility with layout positioning on the web frontend.

Versão 11.2.2 (01/02/2018)

  • Introduction of a sub-title on the site title to better describe the service.

Versão 11.2.1 (29/01/2018)

Versão 11.2.0 (22/01/2018)

Versão 11.1.1 (23/09/2017)

Versão 11.1.0 (16/09/2017)

Versão 11.0.1 (02/06/2017)

Versão 11.0.0 (01/06/2017)

Versão 10.12.2 (19/05/2017)

Versão 10.12.1 (16/05/2017)

  • Comprometer-se 93c6e
    Correção de erros
    Fixed a display issue on the frontpage. Under certain circumstances new items were not shown as bold.

Versão 10.12.0 (28/04/2017)

Versão 10.11.0 (21/04/2017)

Versão 10.10.0 (10/04/2017)

Versão 10.9.0 (01/04/2017)

Versão 10.8.0 (22/03/2017)

  • Comprometer-se 1f1f6
    Funcionalidade
    Pedido do cliente
    Vulnerability entries flagged as false-positive do now highlight this fact on their pages (title and introduction).

Versão 10.7.0 (21/03/2017)

  • Comprometer-se 2eb19
    Funcionalidade
    Introduced data for OVAL and IAVM. Completed all existing entries with appropriate data.

Versão 10.6.0 (23/02/2017)

Versão 10.5.1 (13/02/2017)

  • Optimized the indexing of the database to improve search performance.

Versão 10.5.0 (01/02/2017)

Versão 10.4.1 (20/01/2017)

  • Optimized performance by using specific features and configuration settings in PHP7.

Versão 10.4.0 (18/01/2017)

Versão 10.3.0 (01/01/2017)

Versão 10.2.0 (20/12/2016)

  • Comprometer-se afa9d
    Funcionalidade
    Introduced Bug of the Day on the front page. One of the more serious or interesting issues of the recent days is shown every day.

Versão 10.1.1 (19/12/2016)

  • Redesign of the frontpage with a slick layout and better data accessibility.

Versão 10.1.0 (16/12/2016)

  • Comprometer-se 17b00
    Funcionalidade
    Implemented a module to detect loss of data integrity on the service.

Versão 10.0.0 (01/12/2016)

Versão 9.19.1 (08/11/2016)

  • Optimization of database table structures to gain more flexibility and performance.

Versão 9.19.0 (07/11/2016)

  • Comprometer-se 41c1a
    Funcionalidade
    Implementation of Content Security Policy (CSP) to improve web security of the service.

Versão 9.18.0 (02/11/2016)

  • Comprometer-se 2c835
    Funcionalidade
    It is now possible to upvote comments for vulnerability entries. Upvoted comments are shown on top of the list.

Versão 9.17.0 (01/11/2016)

Versão 9.16.0 (26/10/2016)

  • Comprometer-se 464dc
    Funcionalidade
    Editing a section of a vulnerability will automatically jump to the correct section of the edit form.

Versão 9.15.0 (25/10/2016)

  • Comprometer-se cbba3
    Funcionalidade
    Existing vulnerability entries can now be edited immediately by members of the moderation team.

Versão 9.14.0 (14/10/2016)

  • Comprometer-se 83203
    Funcionalidade
    Enhanced the existing cache module to allow caching of database queries and results.

Versão 9.13.0 (11/10/2016)

Versão 9.12.0 (10/10/2016)

  • Comprometer-se b9c2d
    Funcionalidade
    Registered users are able to see history of vulnerability entries they have been viewing earlier.

Versão 9.11.0 (07/10/2016)

Versão 9.10.0 (06/10/2016)

Versão 9.9.0 (05/10/2016)

  • Comprometer-se da14a
    Funcionalidade
    Users accessing resources which require an authentication receive a proper error message.

Versão 9.8.0 (04/10/2016)

  • Comprometer-se 2f00f
    Funcionalidade
    Users are able to reset their password via email (password recovery).

Versão 9.7.0 (03/10/2016)

Versão 9.6.0 (24/06/2016)

  • Comprometer-se 688a5
    Funcionalidade
    Added a limiter to prevent malicious users from scraping our data without authorization.

Versão 9.5.0 (22/06/2016)

Versão 9.4.0 (01/10/2016)

Versão 9.3.1 (05/07/2016)

Versão 9.3.0 (30/06/2016)

  • Comprometer-se 4aecf
    Funcionalidade
    Some statistical data is now stored in a centralized table which allows them to be shown on multiple places without new calculations every time.

Versão 9.2.0 (02/05/2016)

Versão 9.1.1 (29/04/2016)

Versão 9.1.0 (27/04/2016)

Versão 9.0.0 (14/04/2016)

  • Complete rewrite of the search engine to provide better matches and optimized performance.

Versão 8.1.2 (06/04/2016)

  • Optimization of HTML code to make pages smaller and faster to download and render.

Versão 8.1.1 (04/04/2016)

  • Comprometer-se 3b609
    Correção de erros
    Fixed a bug or slow indexes which improved the performance of vulnerability display a lot.

Versão 8.1.0 (01/04/2016)

Versão 8.0.0 (14/03/2016)

Versão 7.1.3 (11/03/2016)

Versão 7.1.2 (23/02/2016)

Versão 7.1.1 (17/02/2016)

  • Renaming the Twitter handle from scipvulbot to "vuldb"https://twitter.com/vuldb.

Versão 7.1.0 (19/01/2016)

  • Comprometer-se 55bf1
    Funcionalidade
    Enhancing statistical overview to provide previews and forecasts based in historical data.

  • Comprometer-se 72424
    Funcionalidade
    Creating new text for different pages and sub-pages.

Versão 7.0.5 (01/12/2015)

  • Comprometer-se ea951
    Otimização
    Pedido do cliente
    Adding caching modules to improve site performance. Caching is possible per site and file.

Versão 7.0.4 (20/11/2015)

  • Comprometer-se 58def
    Otimização
    Pedido do cliente
    Increasing update frequency of existing entries.

Versão 7.0.3 (19/08/2015)

  • Comprometer-se 2ddb7
    Correção de erros
    Corrected the listing of multiple authors of a vulnerability.

Versão 7.0.2 (07/08/2015)

Versão 7.0.1 (03/08/2015)

Versão 7.0.0 (10/07/2015)

  • Comprometer-se 243a7
    Funcionalidade
    Redesign of modular frontpage with the introduction of Top 5 lists.

Versão 6.31.0 (07/07/2015)

Versão 6.30.0 (09/03/2015)

  • Comprometer-se e19c1
    Funcionalidade
    Introduction of new queue for vulnerability processing by mod team.

Versão 6.29.3 (25/02/2015)

Versão 6.29.2 (03/02/2015)

  • Optimizaton of summaries and descriptions of vulnerability entries.

Versão 6.29.1 (08/01/2015)

Versão 6.29.0 (24/06/2014)

Versão 6.28.0 (26/05/2014)

  • Comprometer-se 0f72a
    Funcionalidade
    Introduction of the "see also" hint which lists entries with are connected or similar.

Versão 6.27.0 (17/04/2014)

  • Comprometer-se 35f6f
    Funcionalidade
    Adding a field to declare the date of the introduction of a vulnerability.

Versão 6.26.1 (27/03/2014)

  • Optimization of queuing of new vulnerabilities to better prioritize processing.

Versão 6.26.0 (20/03/2014)

Versão 6.25.12 (14/03/2014)

Versão 6.25.11 (07/03/2014)

  • Optimizing collision detection during the processing of new entries.

Versão 6.25.10 (10/02/2014)

Versão 6.25.9 (29/01/2014)

  • Added helper for vulnerability moderation team to determine arguments of attacks faster and more reliable.

Versão 6.25.8 (28/01/2014)

Versão 6.25.7 (23/01/2014)

  • Optimizing helper for vulnerability moderation team to complete new and existing entries with additional data. This increases data quality drastically.

Versão 6.25.6 (14/01/2014)

  • Comprometer-se a17f4
    Correção de erros
    Fixed a bug where sometimes summaries and descriptions did contain spaces twice instead of once. This was just a problem in the HTML source code and not on the rendered web site.

Versão 6.25.5 (09/01/2014)

  • Added helper for vulnerability moderation team to determine keywords which shall be used within the title of a vulnerability entry.

Versão 6.25.4 (19/12/2013)

  • Optimizing the autocomplete feature to update new entries with historical data.

Versão 6.25.3 (06/11/2013)

  • Optimizing the pre-parser to handle import of new vulnerability entries.

Versão 6.25.2 (22/10/2013)

Versão 6.25.1 (21/10/2013)

  • Changing the algorithm to calculate the risk rating of vulnerability entries.

Versão 6.25.0 (18/10/2013)

Versão 6.24.0 (17/10/2013)

  • Comprometer-se 01303
    Funcionalidade
    Introducing the threat level to show an indicator for the current vulnerability landscape.

Versão 6.23.0 (03/10/2013)

  • Comprometer-se e8e8f
    Funcionalidade
    Adding the possibility to add a custom word to the title to provide more details on first sight.

Versão 6.22.0 (01/10/2013)

  • Comprometer-se f8c1e
    Funcionalidade
    Establishing a background updater which handles entries which need to be updated without interfering with the manual work of the moderation team.

  • Enhancement of the review procedure of CVE entries pushed by MITRE to improve processing and quality.

Versão 6.21.0 (13/09/2013)

Versão 6.20.1 (12/09/2013)

Versão 6.20.0 (11/09/2013)

Versão 6.19.0 (10/09/2013)

Versão 6.18.0 (23/08/2013)

Versão 6.17.0 (12/08/2013)

Versão 6.16.0 (09/08/2013)

Versão 6.15.2 (05/07/2013)

Versão 6.15.1 (28/06/2013)

  • Optimizing the plausability checks during vulnerability moderation to prevent contradicting and wrong data.

Versão 6.15.0 (19/06/2013)

Versão 6.14.1 (11/06/2013)

  • Updating large quantities of vulnerabilities is now improved thanks to incremental updates.

Versão 6.14.0 (03/06/2013)

Versão 6.13.0 (31/05/2013)

  • Comprometer-se 22b2b
    Funcionalidade
    Added the capability to add quotes from advisories to enrich entries.

  • Comprometer-se 22b2b
    Funcionalidade
    Added the capability to add links to videos for a vulnerability.

Versão 6.12.0 (29/04/2013)

Versão 6.11.0 (11/04/2013)

  • Comprometer-se 6a9d2
    Funcionalidade
    Added the capability to list multiple different products in an affected list. This is done additionally to the main product that is affected by a vulnerability.

Versão 6.10.2 (04/04/2013)

  • Enhanced input validation mechanism during vulnerability management to prevent mistakes regarding vendor/product definitions.

Versão 6.10.1 (28/03/2013)

  • Optimization of logging and tracking of queued items processed by the moderation team.

Versão 6.10.0 (19/03/2013)

  • Comprometer-se c46f6
    Funcionalidade
    Added input validation mechanisms during vulnerability management.

  • Optimized input validation mechanisms during vulnerability management.

Versão 6.9.1 (09/01/2013)

  • Comprometer-se b0410
    Correção de erros
    Fixed an issue in the database. This did only affect moderation of vulnerabilities and was not reflected on the user-side of the service.

Versão 6.9.0 (21/12/2012)

  • Comprometer-se 79a9b
    Funcionalidade
    Added a feature to normalize terms between different vulnerability entries.

Versão 6.8.1 (26/11/2012)

  • Prepared the support for Milw0rm data for entries with an ID up to 50000.

Versão 6.8.0 (31/10/2012)

Versão 6.7.0 (15/10/2012)

Versão 6.6.0 (01/10/2012)

Versão 6.5.0 (24/09/2012)

Versão 6.4.0 (04/07/2012)

Versão 6.3.0 (18/06/2012)

Versão 6.2.2 (05/06/2012)

  • Optimizing the autocomplete feature to update new entries with historical data.

Versão 6.2.1 (10/04/2012)

Versão 6.2.0 (13/03/2012)

Versão 6.1.1 (09/03/2012)

Versão 6.1.0 (08/03/2012)

  • Comprometer-se c17b6
    Funcionalidade
    Added the calculation of the exposure time which measures the time of the disclosure and the mitigation possibilities of a vulnerability.

  • Reviewed all available data of OSVDB.

Versão 6.0.0 (06/03/2012)

Versão 5.2.2 (05/03/2012)

Versão 5.2.1 (02/03/2012)

Versão 5.2.0 (15/02/2012)

  • Comprometer-se d6183
    Funcionalidade
    Added web import feature for vulnerability moderators to handle new entries based on web resources.

Versão 5.1.0 (06/01/2012)

  • Comprometer-se 2e4ed
    Funcionalidade
    Added single import feature for vulnerability moderators to handle single entries outside the regular queueing.

Versão 5.0.0 (22/02/2011)

Versão 4.10.2 (01/12/2010)

Versão 4.10.1 (30/07/2010)

Versão 4.10.0 (10/06/2010)

  • Comprometer-se 57677
    Funcionalidade
    Adding Alert Info on web site to inform visitors about latest critical issue.

  • Comprometer-se 80bfa
    Funcionalidade
    Delivering ads for non-paying and unauthenticated users.

  • Optimizing database structure for more flexibility and performance.

Versão 4.9.0 (08/03/2010)

Versão 4.8.1 (10/02/2010)

Versão 4.8.0 (08/02/2010)

  • Comprometer-se 47351
    Funcionalidade
    Adding the alert info on top of the site to show the most recent vulnerability with the highest emergency rating.

Versão 4.7.2 (05/02/2020)

Versão 4.7.1 (02/02/2010)

Versão 4.7.0 (11/01/2011)

  • Comprometer-se 90de3
    Funcionalidade
    Pedido do cliente
    Added VulDB Alert to inform customers about issues applicable for them.

Versão 4.6.0 (16/12/2009)

Versão 4.5.0 (27/10/2009)

Versão 4.4.0 (03/09/2009)

Versão 4.3.0 (25/08/2009)

  • Comprometer-se 61ad7
    Funcionalidade
    Completing existing entries with most actual data. This includes but is not limited to CVE, Secunia, SecurityTracker, vendor, and confirmation details. More information.

Versão 4.2.0 (20/08/2009)

Versão 4.1.0 (01/08/2009)

Versão 4.0.1 (26/06/2009)

Versão 4.0.0 (23/06/2009)

Versão 3.5.0 (01/07/2006)

Versão 3.4.0 (19/05/2004)

Versão 3.3.0 (01/01/2004)

Versão 3.2.0 (19/12/2003)

Versão 3.1.0 (18/11/2003)

Versão 3.0.0 (01/03/2003)

  • Comprometer-se d28ca
    Funcionalidade
    Service is completely re-written in Perl and uses a dedicated backend for vulnerability moderation to gain more flexibility.

  • Bugbase is re-branded as scip VulnDB and hosted on www.scip.ch.

Versão 2.0.0 (01/09/2002)

  • Changed from static web site to dynamic database (with the kind support of DukeCS).

Versão 1.0.0 (01/01/1997)

Interested in the pricing of exploits?

See the underground prices here!