Версия 16.6.12 (03.02.2023)

  • Commit 1c4ca
    Customer request
    Invalid URL requests to the API are not always redirected to prevent inefficient usage of the API.

Версия 16.6.11 (28.01.2023)

  • Commit 9e571
    Customer request
    Fixed an issue in the API where request for entry_timstampe_change for older entries did not return the desired amount of items.

Версия 16.6.10 (23.01.2023)

Версия 16.6.9 (22.01.2023)

  • Commit 05f5c
    Improvement of the Google Hacking view which provides a wide variety of Google Dorks.

  • Commit 32026
    Faster and smarter processing of cache data which improves the overall performance of the service drastically.

Версия 16.6.8 (21.01.2023)

  • Commit 830d3
    Invalid URL requests to the service are usually redirected, to point the user to the correct URL. This is now approached more consistantly.

Версия 16.6.7 (20.01.2023)

  • Commit e6e23
    Performance optimization to increase responsibility for a wide variety of views.

Версия 16.6.6 (12.01.2023)

  • Commit 6c542
    Improvement of search by purl statements. Better matching of products and versions possible.

Версия 16.6.5 (11.01.2023)

  • Commit 7c9bd
    Better indicator for disputed vulnerability entries that are handled by our CNA team.

Версия 16.6.4 (10.01.2023)

Версия 16.6.3 (09.01.2023)

  • Commit 9b662
    Better handling of user sessions, especially if there is a lot of activities on the service.

Версия 16.6.2 (07.01.2023)

Версия 16.6.1 (04.01.2023)

Версия 16.6.0 (03.01.2023)

Версия 16.5.4 (02.01.2023)

  • Commit 9a5e1
    Extended display of multiline quotes of vulnerabilities for software, advisories, vulnerabilities, exploits, and countermeasures.

Версия 16.5.3 (21.12.2022)

  • In very rare cases the derivative identification of vulnerability classes was not working.

Версия 16.5.2 (18.12.2022)

Версия 16.5.1 (17.12.2022)

Версия 16.5.0 (16.12.2022)

Версия 16.4.6 (12.12.2022)

Версия 16.4.5 (10.12.2022)

  • Commit 47588
    More performance improvement of the API for timeranges like advisory_date_start, entry_timestamp_create_start, entry_timestamp_change_start, and entry_timestamp_all_start.

Версия 16.4.4 (08.12.2022)

  • Commit fc381
    Customer request
    In API 3.52 performance optimization of certain queries requesting timeranges like advisory_date_start, entry_timestamp_create_start, entry_timestamp_change_start, and entry_timestamp_all_start.

Версия 16.4.3 (07.12.2022)

  • Commit dba58
    Improved handling of duplicate vulnerability entries. These are processed much faster, flagged as duplicates or even hidden under certain circumstances.

Версия 16.4.2 (05.12.2022)

Версия 16.4.1 (04.12.2022)

Версия 16.4.0 (03.12.2022)

Версия 16.3.4 (26.11.2022)

  • Commit dae79
    Improved extended CPE dictionary generation. By dropping attributes that are not necessary the file generation becomes faster and the file becomes smaller.

Версия 16.3.3 (25.11.2022)

  • Commit 726b4
    Hardware upgrade for better memory and processing handling.

Версия 16.3.2 (22.11.2022)

  • Commit 21d9b
    Improved coverage and flagging of software products known to be end-of-life.

Версия 16.3.1 (21.11.2022)

  • Commit 23f71
    Better handling of vulnerability entries flagges as false-positives or revoked data parts. Summaries reflect the status better and overviews tag them more prominent.

Версия 16.3.0 (18.11.2022)

  • Commit 085b7
    Additional links to the internal knowledge base and external sources available in vulnerability summaries and descriptions. This makes research a lot faster, easier, and more comfortable.

Версия 16.2.0 (08.11.2022)

  • Commit ba2e4
    Customer request
    Introduction of the field software_support_availability to identify products which are end-of-life. These are shown in vulnerability entries and since API 3.51.

Версия 16.1.1 (07.11.2022)

  • Commit 21a87
    Customer request
    Fixed a bug where some searches for CPE strings were not working properly.

Версия 16.1.0 (31.10.2022)

  • Commit 62218
    Customer request
    Introduction of the fields software_license_type and software_license_name to better understand licensing and support coverage of an affected product. These are shown in vulnerability entries and since API 3.50.

Версия 16.0.3 (20.10.2022)

Версия 16.0.2 (19.10.2022)

  • Vulnerability entries without the definition of software_version but with a definition of countermeasure_upgrade_version will show this information properly in the document title.

Версия 16.0.1 (18.10.2022)

  • Commit f18ee
    Vulnerability entries list associated changesets with date and count of changes. This makes it easier to understand the lifecycle of an entry.

Версия 16.0.0 (15.10.2022)

  • Commit 30f76
    Customer request
    The vulnerability data team is taking advantage of the new source monitoring modules. An advanced artificial intelligence enumerates different sources to determine new vulnerabilities or additional details. If such are found, they are added to the submission queue and will be reviewed by the moderation team. This will increase coverage, processing speed, and data quality of vulnerability entries drastically.

Версия 15.5.6 (10.10.2022)

Версия 15.5.5 (07.10.2022)

  • Commit fb472
    Optimization of the user menu as shown on devices with smaller screens.

Версия 15.5.4 (06.10.2022)

  • Commit 78b19
    Sites showing search results with a new search form will set the focus on the form field for faster processing of new search queries.

Версия 15.5.3 (30.09.2022)

  • Commit 53399
    Customer request
    In API 3.48 fixed an issue for the field parameter where only old notations of vulnerability_cvss3_basevector_vuldb and vulnerability_cvss3_tempvector_vuldb instead also of vulnerability_cvss3_vuldb_basevector and vulnerability_cvss3_vuldb_tempvector were supported.

  • Commit 4995f
    In API 1.16/2.34/3.49 a more graceful handling of too many definitions in the fields parameter got established. If there are too many fields defined, only the first ones will be used and the others silently ignored.

Версия 15.5.2 (28.09.2022)

Версия 15.5.1 (25.09.2022)

Версия 15.5.0 (23.09.2022)

Версия 15.4.1 (20.09.2022)

  • Commit c9710
    Improved the declaration of impacts within description and summaries of vulnerabilities.

Версия 15.4.0 (19.09.2022)

Версия 15.3.11 (18.09.2022)

Версия 15.3.10 (15.09.2022)

  • Commit 8028c
    Better memory handling of the service to improve responsiveness of queries and views.

Версия 15.3.9 (14.09.2022)

Версия 15.3.8 (11.09.2022)

  • Fixed an issue where empty CWE data was shown in vulnerability entries. This was just an interface error on the web frontend.

Версия 15.3.7 (08.09.2022)

  • Commit e5ba5
    Customer request
    Fixed an issue with the RSS feeds where certain special characters in the title element lead to XML validation errors. Reported by Calvin Mende.

Версия 15.3.6 (07.09.2022)

Версия 15.3.5 (06.09.2022)

  • Commit 144c0
    Customer request
    Fixed an issue where certain search requests via web and API were not executed at all. Reported by user showmax

Версия 15.3.4 (05.09.2022)

  • Commit 61068
    Another performance improvement of search queries. Lookups for functions and arguments are now multiple times faster as well.

Версия 15.3.3 (02.09.2022)

  • Commit 6ae56
    Customer request
    Performance improvement of search queries. Especially queries for URLs are now multiple times faster.

Версия 15.3.2 (30.08.2022)

Версия 15.3.1 (29.08.2022)

Версия 15.3.0 (27.08.2022)

  • Commit 13bc6
    Customer request
    Vulnerability entries show multiple CWE if available. In this case they are listed in descending order of accuracy.

Версия 15.2.3 (19.08.2022)

  • Commit 87315
    Vulnerability entries flagged as false-positive are shown with this tag in lists (e.g. overview, search).

Версия 15.2.2 (17.08.2022)

  • Commit 4bf82
    Another improvement of entropy of the CSRF token generation for critical forms.

Версия 15.2.1 (14.08.2022)

  • Commit 6d5fa
    In API 3.46 he virtual fields advisory_reportconfidence, exploit_exploitability, countermeasure_remediationlevel provide better data accurary to improve data quality.

Версия 15.2.0 (11.08.2022)

  • Commit c5cd8
    Customer request
    In API 3.45 the Vulnerability API is able to show additional CTI information by enabling cti=1 within requests. This is possible for free accounts, commercial accounts and enterprise accounts with the CTI option enabled. The real-time availability of the data introduces some increased round trip times for such queries.

Версия 15.1.2 (09.08.2022)

Версия 15.1.1 (12.07.2022)

  • Commit b168a
    Fixed an issue where vulnerabilities with product versions ending with .x wildcards were handled inapprorpiately.

Версия 15.1.0 (08.07.2022)

  • Commit 5134e
    Customer request
    Certain views contain a column listing the latest EPSS (Exploit Prediction Scoring System) values for vulnerabilities.

Версия 15.0.0 (05.07.2022)

  • Commit c13ba
    Customer request
    In API 3.44 introduced the CTI API which supports the request types ipaddr, actor, and events. API credit consumption is slightly different than within the Vulnerability API.

Версия 14.27.1 (29.06.2022)

  • Commit 093a3
    Listing of important identifiers of vulnerabilities were optimized to provide better searchability.

Версия 14.27.0 (24.06.2022)

  • Commit ab1f7
    English vulnerability descriptions explain the vulnerability classes according to the CWE definitions.

Версия 14.26.6 (23.06.2022)

  • Commit 0761d
    Improved the support for less popular CWE classes to provide better identification capabilities of exotic vulnerabilities.

Версия 14.26.5 (16.06.2022)

  • Commit 4a400
    Faster synchronization of EPSS (Exploit Prediction Scoring System) data to increase confidence of predictions.

Версия 14.26.4 (11.06.2022)

  • Commit e54df
    Improved version listing for releases using letters in version numbering (e.g. OpenSSL).

Версия 14.26.3 (10.06.2022)

  • Commit 986a8
    Better accuracy of product requests in the Monoblock.

Версия 14.26.2 (07.06.2022)

Версия 14.26.1 (02.06.2022)

Версия 14.26.0 (01.06.2022)

  • Commit 6b2ff
    Customer request
    Introduction of the Exploit Prediction Scoring System which is able to predict chances of successful exploitation of vulnerabilities. Official EPSS data is kept in sync and shown in the vulnerability details.

  • Commit 51aab
    Customer request
    In API 2.32/3.43 introduced the fields exploit_epss_score and exploit_epss_percentile which provide live data of EPSS (Exploit Prediction Scoring System) to predict chances of successful exploitation.

Версия 14.25.10 (31.05.2022)

  • Fixed an issue where certain links were not correctly used in the vulnerability summaries for authenticated users. Reported by Andrea Hauser

Версия 14.25.9 (25.05.2022)

Версия 14.25.8 (23.05.2022)

  • Commit 01046
    Customer request
    In API 3.41 accessing the field software_cpe23 is possible again. Other major releases of the API were not affected. Reported by Stefan Sander.

Версия 14.25.7 (15.05.2022)

Версия 14.25.6 (12.05.2022)

Версия 14.25.5 (11.05.2022)

Версия 14.25.4 (10.05.2022)

Версия 14.25.3 (06.05.2022)

  • Commit e8a31
    The latest videos shown on the frontpage are updated faster to provide access to the latest entries.

  • Commit dfe4e
    Customer request
    In API 1.14/2.31/3.41 fixed an issue where requests with entry_timestamp_create did include entries that matched entry_timestamp_change instead. Reported by user

Версия 14.25.2 (04.05.2022)

  • Commit 52eb6
    The personal view of My Alert shows matching entries ranging back 90 days.

Версия 14.25.1 (03.05.2022)

Версия 14.25.0 (02.05.2022)

Версия 14.24.1 (29.04.2022)

Версия 14.24.0 (27.04.2022)

  • Commit 91fce
    Customer request
    In API 3.40 using the parameter format=csv makes it possible to output vulnerability data as CSV. Not all request types are supported, not all fields are included, and API header information is not part of the output.

Версия 14.23.1 (25.04.2022)

  • Commit c49ec
    Improved the actor and compaign association of the CTI module. Interlinking data is better and provides results with increased accuracy.

  • Commit 30e2c
    CTI indicators shown are either verified or predictive and shown with the associated tag.

Версия 14.23.0 (24.04.2022)

Версия 14.22.0 (21.04.2022)

Версия 14.21.2 (20.04.2022)

  • Commit 1ca57
    Customer request
    Alerts sent via email use asterisks to prevent Microsoft Outlook from deleting newlines.

  • Commit 1ca57
    Alerts sent via email refer to entries with the new format VDB-1234 instead of the old format ID 1234.

  • Commit 00701
    Switched symbols used in the community activity stream from emoji to a dedicated font to provide better reliability on different platforms.

Версия 14.21.1 (19.04.2022)

  • Commit 90187
    Certain elements on the frontpage use additional icons to visualize data sources.

Версия 14.21.0 (16.04.2022)

  • Commit 0063c
    In API 3.39 enabled auto-complete feature for software_type even if the field is not yet defined in the monoblock.

Версия 14.20.9 (14.04.2022)

Версия 14.20.8 (13.04.2022)

Версия 14.20.7 (11.04.2022)

  • Commit 766de
    Performance optimization of certain filtered views used by the CNA team.

  • Commit 45617
    Customer request
    The autocomplete feature for versioning of certain products was not able to finalize the output. Reported by user lywand

Версия 14.20.6 (09.04.2022)

Версия 14.20.5 (08.04.2022)

Версия 14.20.4 (01.04.2022)

  • Commit 8e9e6
    The overview of monitored actors displays the number of collected IOC (Indicators of Compromise), TTP (Tactics, Techniques, Procedures), IOA (Indicators of Attack), campaigns and external references.

Версия 14.20.3 (29.03.2022)

  • Commit 45456
    New overview of actors shows the amount of available indicators and used sources. The list is also sortable for better viewing.

Версия 14.20.2 (28.03.2022)

  • Commit fdbeb
    Update of icons used in menus and on other parts of the service.

Версия 14.20.1 (26.03.2022)

Версия 14.20.0 (21.03.2022)

Версия 14.19.0 (20.03.2022)

Версия 14.18.4 (19.03.2022)

Версия 14.18.3 (15.03.2022)

  • Commit c2804
    Scrollbars of elements provide better styling to improve user experience, especially on smaller screens.

Версия 14.18.2 (14.03.2022)

Версия 14.18.1 (10.03.2022)

  • Commit 25bad
    Improved layout of the changelog items to provide better visibility.

  • Commit ed2be
    Timelines in vulnerability entries do always link to countermeasures if patch or upgrade URLs are known.

  • Some links to countermeasures were clickable but still threw a 404 even though the requested resources were available. Reported by user mael

Версия 14.18.0 (09.03.2022)

  • Commit 72d69
    Items listed in legends of charts are clickable to allow quick drilldowns.

  • Certain pie charts did not reflect the correct number of known matches.

Версия 14.17.5 (07.03.2022)

  • Commit c162c
    A better layout helps vulnerability moderators to identify priority entries in the submission queue.

Версия 14.17.4 (01.03.2022)

  • In certain views the generation of timeline graphs was not possible if the advisory_date of an entry has been changed to another year.

Версия 14.17.3 (28.02.2022)

Версия 14.17.2 (27.02.2022)

  • Commit c8b23
    Performance optimization of list views which contain CVSSv3 Meta Scores.

  • Under certain circumstances an existing remediation level based on the field countermeasure_remediationlevel was not shown correctly.

Версия 14.17.1 (25.02.2022)

  • Commit 4882d
    Icon text in the submenu allows hyphenation to optimize the view on narrow screens.

  • Commit 60d49
    Charts for timespans are optimized to zoom into the timeframe whenever possible and useful.

Версия 14.17.0 (23.02.2022)

  • Commit f8d99
    The applicable copyright license is shown in the footer of the page.

Версия 14.16.1 (22.02.2022)

  • Commit c6483
    Table listings with narrow columns provide better spacing to fit the content.

Версия 14.16.0 (21.02.2022)

  • Commit 93389
    Customer request
    The CTI views do allow for drilldown of IP addresses as IoC (Indicator of Compromise).

  • Commit 9e1e2
    Customer request
    Listing of version numbers ranging back to 0.x might have contained version 0.0. This is usually wrong and got fixed. Thanks to Cheek Yang of xFusion Digital Technologies for making us aware of this issue.

Версия 14.15.1 (20.02.2022)

  • Commit 24c78
    Certain CTI views which have complex hostnames as IoC (Indicator of Compromise) allow much faster analysis.

Версия 14.15.0 (18.02.2022)

  • Commit 4da51
    Customer request
    Custom CTI analysis contains IOC (Indicator of Compromise), TTP (Tactics, Techniques, Procedures) and IOA (Indicator of Attack) as well.

Версия 14.14.0 (17.02.2022)

  • Commit 52552
    Customer request
    The CTI view for countries lists popular TTP (Tactics, Techniques, Procedures) and IOA (Indicator of Attack) as well.

Версия 14.13.4 (09.02.2022)

  • Commit 291bf
    Search requests for CVE identifiers detects mismatching dashes (e.g. en and em) and corrects them automatically.

Версия 14.13.3 (08.02.2022)

Версия 14.13.2 (31.01.2022)

  • Commit b0bff
    Activity charts provide data with better accuracy.

  • Commit b0bff
    Activity charts have a better performance during generation.

Версия 14.13.1 (30.01.2022)

  • Commit f1aa5
    Performance optimization of APT actor association charts during generation.

Версия 14.13.0 (28.01.2022)

Версия 14.12.1 (27.01.2022)

  • Commit 37a7c
    In API 1.13/2.29/3.37 provoking 405 Unknown request type errors again is only possible after a few minutes. This prevents flooding the API access log and prevents misconfigured clients from exhausting the API credits quickly.

Версия 14.12.0 (24.01.2022)

Версия 14.11.8 (21.01.2022)

  • Commit b1aa4
    Improvement of URL validation during moderation to prevent incorrect values.

Версия 14.11.7 (15.01.2022)

  • Commit 9fa88
    Improved security of SPF and DMARC. Recommendations were submitted by Nikhil Rane.

  • Commit 9fa88
    Improved security and usability of signup procedure and passwort recovery procedure. Recommendations were submitted by Nikhil Rane.

Версия 14.11.6 (14.01.2022)

  • Commit 68c68
    Layout optimization of certain forms using additional information or CAPTCHA elements.

Версия 14.11.5 (13.01.2022)

  • Commit ac2a6
    Performance tweaks of certain views.

Версия 14.11.4 (12.01.2022)

Версия 14.11.3 (11.01.2022)

  • Commit b59d0
    Performance and memory optimization of certain queries which do not need CTI data to be shown.

Версия 14.11.2 (07.01.2022)

  • Commit 9ade9
    Multi-threading has been optimized to decrease resource consumption and to increase performance.

  • Commit 509bb
    External links in the table of contents of the Knowledge Base open a new window.

Версия 14.11.1 (05.01.2022)

Версия 14.11.0 (04.01.2022)

  • Commit bfdcd
    Customer request
    It is possible to do a CTI analysis of dedicated entries to show activities, interest distribution, active actors, and indicators of compromise. This feature requires an additional CTI license.

Версия 14.10.2 (28.12.2021)

  • Users hiding their profile were not able to show their own profile. This has been fixed.

Версия 14.10.1 (24.12.2021)

  • Commit 8b772
    Customer request
    Scrollbars on Mozilla browsers are styled or even hidden whenever useful to provide a better user experience on smaller screens.

Версия 14.10.0 (23.12.2021)

Версия 14.9.0 (22.12.2021)

Версия 14.8.1 (18.12.2021)

Версия 14.8.0 (17.12.2021)

  • Commit bb5ae
    Customer request
    Language support for Russian (ru). This includes basic parts of the web site and vulnerability details.

Версия 14.7.0 (14.12.2021)

Версия 14.6.0 (12.12.2021)

Версия 14.5.0 (11.12.2021)

Версия 14.4.1 (10.12.2021)

  • Commit 5213b
    Commit details show more information and link to additional resources.

  • Commit 03ef5
    Performance optimization of the front page which loads the vulnerability of the day much faster.

Версия 14.4.0 (09.12.2021)

  • Commit 53394
    Customer request
    All documentation files are moved into the new Knowledge Base. Old links to the documentation remain valid.

  • Commit e75bd
    Optimized padding of breadcrumb items provides better usability.

Версия 14.3.1 (08.12.2021)

  • Commit 9f087
    New multi-threading handling of expensive database queries increases the performance of many requests and views.

Версия 14.3.0 (07.12.2021)

  • Commit 0328b
    Added a breadcrumb navigation item to access higher level sections easier.

  • Commit 20ade
    Release versions in the changelog might be accessed via ID.

  • The user data in the side menu are shown properly even if there are very long strings used.

Версия 14.2.0 (06.12.2021)

Версия 14.1.3 (05.12.2021)

  • Commit 6ba63
    Databox with vulnerability of the day uses better search box for increased accessibility.

Версия 14.1.2 (04.12.2021)

  • Commit ab33b
    Responsive app elements behave better on smaller rectangular screens.

  • All risk views show data properly under any circumstances for authenticated users.

Версия 14.1.1 (03.12.2021)

  • Commit e5209
    Customer request
    The layout for printing views is optimized for better user experience.

  • Commit d0822
    The language path for Japanese is changed from /jp/ to /ja/ to respect ISO 639-1 language two-letter conventions. Old links remain active and redirect to the new URL structure.

  • Commit fa317
    The user menu layout has been optimized for better readability. Especially VulDB moderators and administrators get easier access to relevant data.

Версия 14.1.0 (02.12.2021)

  • Commit e68e7
    Some chart types, especially pie charts and doughnut charts, show an additional legend to provide better visibility of data.

  • Commit 2fa71
    Customer request
    The responsiveness of the user menu on the side behaves better on smaller screens.

  • Commit ee455
    External URLs to MITRE CVE link to the new domain.

Версия 14.0.1 (01.12.2021)

Версия 14.0.0 (30.11.2021)

  • Commit bb919
    Customer request
    Relaunch of the service with a new layout and extended app capabilities.

Версия 13.41.1 (11.11.2021)

  • Commit a667c
    Vulnerability entries without user comments show the requested languages, even if English was the only language selected.

  • Commit 1ff69
    Layout of the login recommendation to comment on vulnerability entries was optimized.

Версия 13.41.0 (10.11.2021)

  • Commit 0c2ae
    Customer request
    Commercial customers using credit card as payment method are able to show their last invoices online. Invoices and receipts can be downloaded from our partner Stripe. All documents are hosted externally. VulDB does not store credit card details, invoices nor receipts.

Версия 13.40.1 (09.11.2021)

  • In API 2.28/3.36 the field vulnerability_bugbounty_price is only shown if there is a bug bounty price defined.

  • Commit 5fe48
    Performance improvement (CPU and memory consumption) of long list views.

Версия 13.40.0 (08.11.2021)

  • Commit 505be
    Customer request
    in API 2.27/3.35 it is now possible to use URL encoding in advanced search queries to make them much easier to handle.

Версия 13.39.1 (06.11.2021)

  • Commit 1c057
    Customer request
    Under rare circumstances a timeframe request did contain entries outside the defined timeframe. Additional validation has been introduced to prevent this effect. Reported by user guliang

Версия 13.39.0 (03.11.2021)

  • Commit 02e0b
    Customer request
    Language support for Portuguese (pt). This includes basic parts of the web site and vulnerability details.

Версия 13.38.0 (01.11.2021)

  • Commit 49840
    Customer request
    Enterprise customers are able to create a custom dashboard with individual charts and lists to maintain their professional vulnerability management.

Версия 13.37.0 (29.10.2021)

  • Commit ecf36
    External links in vulnerability entries known to be not working anymore are flagged as 404 Not Found.

  • Commit 00f47
    In the commit view the column Moderated is renamed to Accepted to indicate the moment a change was approved.

Версия 13.36.2 (27.10.2021)

  • Commit 6ba60
    Most recent entries on the frontpage are listed faster and with more details right after the creation of a new entry.

Версия 13.36.1 (26.10.2021)

  • Commit fe47a
    Customer request
    Overview pages with an huge number of entries are not limited anymore.

Версия 13.36.0 (25.10.2021)

Версия 13.35.1 (19.10.2021)

  • Commit fab04
    Optimization of summaries and descriptions in certain languages to better consider the expected vulnerability class of an entry.

Версия 13.35.0 (09.10.2021)

Версия 13.34.0 (15.09.2021)

  • Commit 153c8
    In API 2.26/3.34 information about bug bounty organization vulnerability_bugbounty_organization, price vulnerability_bugbounty_price, and payout date vulnerability_bugbounty_payoutdate were introduced.

Версия 13.33.1 (13.09.2021)

Версия 13.33.0 (10.09.2021)

Версия 13.32.4 (07.09.2021)

Версия 13.32.3 (06.09.2021)

  • Commit 3c9ba
    Ranges between versions and up to versions are shown with even higher level of accuracy. This includes titles and summaries as well.

Версия 13.32.2 (02.09.2021)

Версия 13.32.1 (31.08.2021)

  • Commit 7ad33
    Hardware upgrade for better memory and processing handling.

Версия 13.32.0 (27.08.2021)

Версия 13.31.0 (26.08.2021)

Версия 13.30.1 (25.08.2021)

Версия 13.30.0 (24.08.2021)

Версия 13.29.3 (23.08.2021)

  • Commit 2d4fa
    Vulnerability comments in a specific language are only shown if the site is loaded in that language.

Версия 13.29.2 (22.08.2021)

  • Commit 12bbe
    Finalized data migration to provide much better performance.

  • Commit 363e0
    Performance optimization of the year views of CVSSv3, CVSSv2, and Exploits by eliminating redundant queries.

Версия 13.29.1 (21.08.2021)

  • Commit b2396
    Eliminated all links to SecurityFocus vulnerability database as they discontinued the service. Thank you for all your contributions to the cyber security industry!

  • Commit adec0
    Re-ordered the listing of external resourced within the reference tables.

  • Commit 9b464
    New color scheme for yearly comparison of CVSS base and temp vectors.

Версия 13.29.0 (19.08.2021)

Версия 13.28.11 (18.08.2021)

  • Commit 2f6c2
    Announcement banner is shown only if necessary to provide the maximum of space.

  • Commit abbea
    Time-only statements are now always shown depending on the selected request language.

Версия 13.28.10 (17.08.2021)

  • Commit 8ae38
    Vulnerability entries hide header tooltip icons as soon as the screen is too small to read them.

Версия 13.28.9 (16.08.2021)

  • Commit 51f56
    Faster calculation and loading of Threat Intelligence activity index chart on the frontpage.

Версия 13.28.8 (15.08.2021)

  • Commit 2b166
    Better performance thanks to optimized database index for several different tables.

Версия 13.28.7 (08.08.2021)

  • Fixed a rare bug on the frontpage where very recent entries are not shown with all available technical details in the title.

Версия 13.28.6 (07.08.2021)

Версия 13.28.5 (05.08.2021)

  • Commit 98081
    Optimized the capabilities of searching with CPE strings. Such searches are now much faster and more accurate.

Версия 13.28.4 (04.08.2021)

  • Commit b697e
    Customer request
    Aligned the listing of entry_changelog to show the field name of vulnerabilitycenter_lastupdatedate correctly. This issue was reported by Fergus Nelson.

  • Commit 006fc
    Customer request
    Under certain circumstances the calculation of exploit prices was not happening. This has been fixed. This bug was reported by Fergus Nelson.

Версия 13.28.3 (02.08.2021)

  • Commit 9864d
    External redirects first tested for malicious code are using HTTP status code 301 Moved Permanently instead of 302 Found.

Версия 13.28.2 (28.07.2021)

Версия 13.28.1 (27.07.2021)

Версия 13.28.0 (26.07.2021)

  • Commit 5f4e7
    Customer request
    Language support for Arabic (ar). This includes basic parts of the web site and vulnerability details. Right-to-left is implemented whenever required.

Версия 13.27.4 (24.07.2021)

  • Commit 7430f
    Current CTI scores in overviews are loaded and shown much faster which improves speed of site generation.

  • Current CTI scores are shown in overviews in any case even if the servers are under heavy load.

  • Current CTI scores in overviews show the correct timestamp of the last update for the most recent entries in the tooltip of the field.

Версия 13.27.3 (17.07.2021)

  • Commit 6861b
    Better import and validation handling for APT actor IoC moderation to improve processing and quality.

Версия 13.27.2 (16.07.2021)

  • Commit 363b6
    Clarification of titles of privilege escalation vulnerabilities. Remote issues that require some form of authentication are shown as Privilege Escalation without mentioning of Remote. Only remote issues without authentication are shown as true Remote Privilege Escalation.

  • Commit 61142
    Customer request
    Fixed a rare bug in API 1.11/2.24/3.31 that created an associative array for software_version if the list of versions numbers contained the value 0. Thanks to Fergus Nelson for reporting this issue.

Версия 13.27.1 (15.07.2021)

Версия 13.27.0 (14.07.2021)

  • Commit cc0e3
    Customer request
    Cyber threat intelligence events display emerging, current, and upcoming activities by actors.

  • Fixed a bug that temp scores of CVSS vectors are not properly stored during initial entry create. This did not affect updated entries.

Версия 13.26.4 (07.07.2021)

Версия 13.26.3 (30.06.2021)

  • Commit ea669
    Reinstated linking to as they resumed adding and updating new CVEs.

Версия 13.26.2 (25.06.2021)

  • Commit 28728
    Customer request
    The Content-Type of all API responses is changed to application/json; charset=utf-8. This is not a change in the API itself which is why the version number of the API endpoints is not incremented.

Версия 13.26.1 (24.06.2021)

  • Commit 0d89b
    Customer request
    The official vulnerability API endpoint is located at /?api and will redirect faulty URLs and GET parameters. Microsoft Power Apps did not respect this URL structure and changed the query string to a parameter tuple with an empty value. Our API endpoint redirected to the correct URL but Power Apps is not capable of following such HTTP redirects. This issue got fixed as Power Apps is now allowed to access the API endpoint even though the request URL format is not entirely correct.

Версия 13.26.0 (18.06.2021)

Версия 13.25.3 (16.06.2021)

  • Commit 0494b
    Performance optimization during stress (e.g. many users, DDoS attacks).

  • Commit 9660e
    Changed the algorithm to generate the category values local and remote in the RSS feeds. Also added the value partial for local if the attack vector is physical.

Версия 13.25.2 (15.06.2021)

Версия 13.25.1 (14.06.2021)

  • Commit fd133
    More accurate timing information about new IoC (Indicator of Compromise) assigned to an APT actor.

Версия 13.25.0 (11.06.2021)

Версия 13.24.1 (09.06.2021)

  • Commit 0d01f
    Optimized abuse detection of search queries for authenticated users.

Версия 13.24.0 (08.06.2021)

Версия 13.23.0 (07.06.2021)

Версия 13.22.1 (04.06.2021)

  • Commit 03370
    Timelines indicating activities show the so called activity index instead of the generic entries label.

  • Commit 03359
    Bar charts showing exploit prives use exploit instead of the generic entries label.

Версия 13.22.0 (31.05.2021)

Версия 13.21.0 (26.05.2021)

  • Commit edf52
    Customer request
    Language support for Japanese (jp). This includes basic parts of the web site and vulnerability details.

Версия 13.20.4 (18.05.2021)

  • Commit 02cd6
    The event of web code improvement shown in the community stream links to the changelog.

  • Commit e9923
    In API 1.9/2.21/3.28 requests by the official Splunk app with a license of less than 10 API credits will throw an 403 Splunk app license expired error to prevent stressing the service with expired Splunk installations.

Версия 13.20.3 (12.05.2021)

  • Commit b4953
    Streamlined entry identifier wording on community activity stream on the frontpage.

Версия 13.20.2 (04.05.2021)

Версия 13.20.1 (02.05.2021)

  • Commit b0e75
    Community activities shown on the frontpage do refer to entries with their corresponding VDB ID to increase readability.

Версия 13.20.0 (29.04.2021)

  • Commit 0d72f
    Frontpage does now show the latest changelog entries of the current day.

  • Commit d6b22
    Customer request
    Vulnerability entries do now always contain links to available upgrades and patches in the Countermeasure section.

Версия 13.19.3 (28.04.2021)

  • Commit 6df70
    Performance optimization of the Threat Intelligence chart on the frontpage.

  • Commit d1eb6
    Customer request
    Fixed an issue where count and overview of user commits were not updated. Reported by user misc

Версия 13.19.2 (26.04.2021)

  • Commit a9542
    Hardware upgrade for better memory and processing handling.

  • Commit 8dd8c
    In API 3.27 the values of numeric request types is verified and if not acceptable, a 400 Bad request error message is shown.

Версия 13.19.1 (24.04.2021)

  • Commit 3855b
    Optimized load balancing, limiter, and DDoS mitigation to provide more stability for legitimate users.

Версия 13.19.0 (22.04.2021)

  • Commit a85dc
    Customer request
    Submitted items are reviewed by an automated pre-parser to define a priority for processing by the moderation team. This increases priority for most important items and therefore improves processing speed.

Версия 13.18.0 (20.04.2021)

  • Commit 612a5
    Customer request
    Language support for Chinese simplified (zh-Hans). This includes basic parts of the web site and vulnerability details.

Версия 13.17.1 (16.04.2021)

  • Commit b93ed
    Code optimization of CTI map generation for faster processing with less memory requirements.

Версия 13.17.0 (15.04.2021)

  • Commit 1ffb5
    Customer request
    Description of CTI trigger possibilities and threshold handling to create events and reports.

  • Commit 881a3
    Footer does now refer to your specific copyright and license depending whether there is a commercial, enterprise, or reseller license established.

Версия 13.16.0 (12.04.2021)

  • Commit f7832
    Customer request
    Some users mistake their mail address as legitimate username to login. In this case a warning message informs the user about the mistake.

Версия 13.15.3 (08.04.2021)

  • Commit 265e0
    Performance optimization for CTI country analysis (closed beta invite only at the moment). Time range analysis is now incremental which makes report generation much faster (especially for larger ranges).

Версия 13.15.2 (31.03.2021)

  • Commit 05005
    All listings in the personal profile do contain timestamps to make identification of single items much easier.

  • Commit cddb4
    Completed some of the missing translations for French, Italian, Spanish, Polish, and Swedish.

  • Commit 6dc4a
    Improved the handling of time format regarding country-specific definitions. The language en will show A.M. and P.M. only if the browser is also set to en-us. Otherwise the 24 hour format is used. If the language is set to fr and the browser announces fr-fr there will be the French format 12h34. The 24 hour format is also used as default for all languages without a specific definition.

Версия 13.15.1 (30.03.2021)

  • Fixed a bug where some long product names, product listings and titles did not show the product name in its entirety.

  • Commit 44ee5
    In API 3.26 fixed an issue where queries for advisory_date_start, entry_timestamp_create_start, entry_timestamp_change_start, and entry_timestamp_all_start did not work properly if the request value had a trailing whitespace.

Версия 13.15.0 (29.03.2021)

  • Commit 15c50
    The personal API history does show the execution time for a request to help optimize queries. The column is shown as seconds and sortable.

  • Commit c4d04
    Customer request
    Added planned features in a roadmap to announce upcoming functionality. The items shown are just suggestions and might change regarding implementation and deployment.

Версия 13.14.3 (28.03.2021)

  • Commit 1ec36
    Customer request
    Better description of update handling, especially prioritization of new data for existing entries and update requests by customers.

  • Commit ae8c3
    Optimized the description of different commit moderation approaches. The actions for handling spam and profanity are explained in detail.

Версия 13.14.2 (26.03.2021)

  • In API 2.20/3.25 the list of multiple items in software_affectedlist and software_notaffectedlist do trim trailing whitespaces correctly.

Версия 13.14.1 (25.03.2021)

  • Commit a8cdf
    Added a new community rank Guru which requires 5000 points to be reached. Therefore, Grand Master is not the highest rank anymore.

Версия 13.14.0 (24.03.2021)

  • Commit 434e3
    Customer request
    Introduced API 3.24 with the new request type entry_timestamp_all_start which combines new items from entry_timestamp_create_start and updated items from entry_timestamp_change_start in a single stream.

Версия 13.13.1 (20.03.2021)

Версия 13.13.0 (17.03.2021)

Версия 13.12.0 (10.03.2021)

  • Commit 699d0
    Customer request
    Made internal changelog public to provide full transparency for our customers. Entries earlier than 2020 just show milestones and not detailed changes.

  • Commit 43dfe
    Added link to changelog under support in main menu and in the footer of the page.

  • Commit c0ba0
    Updated internal quality guidance for CVSS fields during creation of new entries based on official Microsoft disclosures.

Версия 13.11.3 (08.03.2021)

  • Commit 1faf6
    Updated internal quality requirements for advisory_person_name and advisory_person_nickname fields to prevent inaccurate information during daily update procedure.

Версия 13.11.2 (04.03.2021)

  • Commit ecf32
    Optimized limiter to prohibit crawling of view elements by non-commercial users.

  • Commit fa612
    Limiter uses better geolocation data to prevent malicious users from changing IP addresses to slow down detection of abuse.

Версия 13.11.1 (03.03.2021)

  • Fixed a rare German translation issue in a specific sentence of some vulnerability summaries.

Версия 13.11.0 (01.03.2021)

  • Commit 17052
    Prepared language database for upcoming translations.

  • Commit b3dfc
    Optimized language database for better performance.

Версия 13.10.0 (28.02.2021)

Версия 13.9.0 (22.02.2021)

Версия 13.8.0 (04.02.2021)

  • Commit 5626b
    Added load balancing features to handle performance peaks much better.

  • Commit 2efad
    Enabled priority module to provide high-availability for enterprise customers.

Версия 13.7.1 (03.02.2021)

  • Commit 167ac
    Optimized normalize module to improve quality assurance of vulnerability data management.

Версия 13.7.0 (01.02.2021)

  • Commit 14106
    Initiated preparation for port of web services to PHP8. First polyfill functions tested.

Версия 13.6.1 (17.01.2021)

  • Fixed a bug where some new user submissions were shown as rejected even though they were still not processsed yet. This issue was reported by user misc.

Версия 13.6.0 (16.01.2021)

  • Commit 960f5
    Start of internal testing for CTI attribution module to identify APT group activities as such. Used by CTI team to create CTI alerts and infos for paying customers.

Версия 13.5.4 (09.01.2021)

  • Commit d53a8
    Customer request
    Changed entry_timestamp_delta behavior from 7200 to 120 to keep commit grouping much smaller. Entries updated within a short period of time will pushed into the update stream to provide the most actual data to API users.

Версия 13.5.3 (04.01.2021)

  • Commit 96326
    Performance improvement of search engine. Early dissection will speed up some specific search requests.

  • Commit 96326
    Performance improvement of monoblock engine. Compilation of entries is a bit faster under certain circumstances.

Версия 13.5.2 (23.12.2020)

  • Commit db3d5
    Unordered lists in regular content to not a a maximum heigh and auto scrollbars anymore.

Версия 13.5.1 (15.12.2020)

  • Commit c227f
    Performance optimization of monoblock data processing.

Версия 13.5.0 (09.12.2020)

  • Commit 93707
    Added a stylesheet to display "time ago" for stream items.

Версия 13.4.0 (08.12.2020)

  • Commit dcd32
    In API 3.23 added request type cursorinit to determine ideal initial cursor position for ongoing vulnerability stream (e.g. Splunk).

Версия 13.3.0 (04.12.2020)

  • Commit 3abdf
    Introduced information regarding ATT&CK. The fields are currently auto-generated and not part of the monoblock.

  • Commit dbcd2
    In API 2.19/3.22 added field source_cve_cna which contains a string of the CVE Numbering Authority that assigned the CVE.

  • Corrected a display bug for tooltips of CVSS fields on certain overview pages.

Версия 13.2.1 (03.12.2020)

  • Commit 6c403
    Optimized signup flood protection to prevent malicious users from auto-generating community accounts.

Версия 13.2.0 (26.11.2020)

  • Commit 0cd93
    Added new import feature for vulnerability moderators to handle custom entries and large batches of submissions.

  • Commit a4571
    The differences in a diff view are highlighted by color to provide better visibility.

Версия 13.1.2 (13.11.2020)

  • Commit 7983d
    Performance optimization of monoblock data processing.

Версия 13.1.1 (06.11.2020)

Версия 13.1.0 (02.11.2020)

  • Commit f6cc6
    Paying customers do now see a summary on top of every vulnerability entry to identify the most important aspects of the vulnerability.

Версия 13.0.1 (16.10.2020)

  • Commit 68339
    Optimized some indexes within the database to improve performance.

Версия 13.0.0 (09.10.2020)

  • Commit 8b201
    Introduced new monoblock structure to provide more possibilities like commits, commit histories, etc.

Версия 12.26.1 (26.09.2020)

Версия 12.26.0 (10.09.2020)

  • Commit b015c
    The live symbol is pulsating.

  • Commit 2d270
    The CSS code for the custom worldmap is deleted to stramline the CSS file.

Версия 12.25.1 (10.08.2020)

  • Commit b3264
    Optimization of browser rendering speed by adding font-display: swap to the CSS style sheet.

Версия 12.25.0 (16.05.2020)

  • Commit f6e38
    Added an optimization banner to inform users about upcoming changes and features.

Версия 12.24.0 (13.05.2020)

  • Commit 58be3
    New horizontal table style to make some upcoming views better readable.

Версия 12.23.5 (01.05.2020)

  • Commit e655c
    Upgrading to an extended server cluster for better performance.

Версия 12.23.4 (17.04.2020)

  • In API 3.21 the field entry_timestamp_change is now always present even if the entry was just created and never updated yet. In this case it will contain the same value like entry_timestamp_create. User of the official VulDB Splunk App are advised to update to the latest release.

Версия 12.23.3 (04.03.2020)

  • Commit 328c8
    Optimization stopped updating their database. We keep linking old CVEs to their sites but do not do so for newer entries.

Версия 12.23.2 (10.01.2020)

  • Commit ce27f
    Added validation styles for numbers, dates, emails, and urls for forms. These detect missing or wrong data before submitting a form.

Версия 12.23.1 (19.11.2019)

  • Commit 7d12f
    Decreased the font-size of labes from 90% to 75% for better readability.

  • Commit c8999
    Improved style and layout of tooltips for better readability.

Версия 12.23.0 (15.11.2019)

  • Commit 5c4b5
    Load new pages with extended loading time show progress bar spinner at top of the site.

Версия 12.22.0 (09.11.2019)

  • Commit c4f43
    Added logos of vendors/products in entries if available.

  • Commit 46f6e
    Stramlined CSS style sheet regarding mini buttons.

Версия 12.21.0 (08.11.2019)

  • Commit 4f1af
    Added tooltips for easier access to more information.

  • Commit 63433
    Added fade effect for mini buttons for a better user experience.

Версия 12.20.1 (06.11.2019)

  • Commit 01634
    Stramlined box elements and columns.

Версия 12.20.0 (31.10.2019)

  • Commit 032a9
    Customer request
    In API 3.20 added field vulnerability_name which contains a string or array a popular names of the vulnerability (e.g. Shellshock, Poodle).

Версия 12.19.0 (13.09.2019)

  • Commit eaf94
    Customer request
    In API 3.19 added field family entry_details_* which contain entry_details_affected, entry_details_vulnerability, entry_details_impact, entry_details_exploit, entry_details_countermeasures, and entry_details_sources.

Версия 12.18.0 (31.08.2019)

  • Commit 34a45
    In API 3.18 added field entry_replaces to display duplicates which have been replaced by this entry.

Версия 12.17.0 (26.08.2019)

Версия 12.16.0 (22.08.2019)

  • Commit 3ef93
    Added experimental world map to highlight CTI activities.

  • Commit 5054e
    Improved the layout of checkboxes on web forms.

Версия 12.15.0 (06.07.2019)

Версия 12.14.0 (01.07.2019)

  • Commit 2fcc6
    Customer request
    Introduction of software type categories available in the field software_type.

Версия 12.13.3 (04.06.2019)

  • In API 3.16 fixed value of field advisory_identifier, disabled safeguard mechanism to prevent inconsistency in result count.

Версия 12.13.2 (01.06.2019)

Версия 12.13.1 (27.05.2019)

  • Commit 6e92e
    Added loading bar on top of the page to indicate the loading of large pages.

Версия 12.13.0 (24.05.2019)

  • Commit bcb85
    Submitting forms locks input fields and shows progress indicator.

Версия 12.12.0 (17.05.2019)

  • Commit c9222
    In API 3.15 added fields software_website_vendor and software_website_product to the output.

Версия 12.11.0 (08.05.2019)

  • Commit 0fb91
    In API 3.14 requesting dedicated CVSS fields supports the official response format (e.g. vulnerability_cvss3_vuldb_basescore) and the legacy format (e.g. vulnerability_cvss3_basescore_vuldb). The legacy format will be dropped in a future major release of the API.

Версия 12.10.1 (24.04.2019)

  • Commit 1dc8a
    Improved the layout of the search menu item for better accessibility.

  • Commit bb0d0
    The status boxes of live views are now pulsating if there is currently some activity.

Версия 12.10.0 (17.04.2019)

  • Commit d1042
    Customer request
    In API 1.8/2.18/3.13 added field software_cpe23 which introduces full CPE 2.3 support whereas software_cpe is still providing CPE 2.2 data.

Версия 12.9.0 (15.04.2019)

  • Commit 3bfed
    Added a detailed clendar view for years an months.

  • Commit faa07
    Streamlined the row behavior.

Версия 12.8.2 (10.04.2019)

  • Commit 35519
    Hovering a clickable symbol in an overview will now be indicated by the cursor as pointer.

  • Commit cdf7b
    Improved the layout of buttons inside text boxes (e.g. searches).

Версия 12.8.1 (01.04.2019)

  • Commit 27ca6
    Centered the purchase table for better accessibility.

Версия 12.8.0 (29.03.2019)

Версия 12.7.0 (21.03.2019)

Версия 12.6.0 (15.03.2019)

  • Commit d3ac7
    Customer request
    Added multiple levels to the main menu to provide better accessibility to the variety of features.

  • Commit 35f3e
    Added the possibility for buttons within textboxes (e.g. searches).

Версия 12.5.0 (08.03.2019)

Версия 12.4.0 (04.03.2019)

  • Commit 55a0e
    In API 1.7/2.17/3.12 added fields entry_locked_status and entry_locked_reason to inform about entries undergoing update and review processes (they might change soon).

Версия 12.3.0 (01.03.2019)

  • Commit 81d15
    Introduction of the C3BM Index (CVSSv3 Base Meta Index) based on CVSS data of multiple sources.

Версия 12.2.0 (28.02.2019)

  • Commit 231a4
    Large tables might be shown with a striped layout to improve readability.

  • Commit 16d23
    Improved the layout of buttons in the user submenu.

Версия 12.1.0 (25.02.2019)

  • Commit 9c6de
    Customer request
    Symbols in overviews are clickable to provide a drilldown feature. This is true for CVSS, exploit prices, exploitability, and countermeasures.

  • Commit 92aac
    Header text is now a graphical element.

Версия 12.0.4 (23.02.2019)

  • Commit 82de5
    Slightly changed the colorization of remedation and exploitability levels.

Версия 12.0.3 (22.02.2019)

  • Commit 55aa5
    Changed the pointer behavior of certain table headers from grab to regular pointer.

Версия 12.0.2 (21.02.2019)

Версия 12.0.1 (20.02.2019)

  • Commit 2d300
    In API 1.6/2.16/3.11 improved speed, reliability and accuracy of updates queries.

  • Commit d6d17
    Improved the width behavior of user menu buttons.

  • Commit a25da
    Links in overviews are clickable within the whole cell and not just on the text itself.

Версия 12.0.0 (18.02.2019)

  • Commit b9184
    Customer request
    New overviews introduced with a lot of information items.

  • Commit 65679
    Added support for dynamic behavior for long tables with more than six columns.

  • Commit 4c719
    Streamlined the behavior of content and article.

  • Commit 4c719
    Streamlined the behavior of tables.

  • Commit 4c719
    Streamlined the behavior of buttons.

Версия 11.27.0 (15.02.2019)

  • Commit c278e
    Added the posibility to fade-in some elements for a better user experience.

  • Commit 07fdc
    Improved the width behavior of user menu buttons.

Версия 11.26.0 (08.02.2019)

Версия 11.25.0 (06.02.2019)

  • Commit 250b0
    Customer request
    In API 3.10 added request parameter offset to set a starting point for results (pagination).

Версия 11.24.1 (01.02.2019)

  • Commit 5d94f
    Reached the 10.000th community user. Congratulations!

Версия 11.24.0 (18.01.2019)

Версия 11.23.0 (11.01.2019)

  • Commit dfb03
    Customer request
    In API 3.8 VulDB CVSSv3 scores use AI-driven autocomplete based on historical data and additional sources. The field vulnerability_cvss3_vuldb_confidence indicates the confidence of the vectors.

Версия 11.22.1 (08.01.2019)

Версия 11.22.0 (01.01.2019)

  • Commit 772cf
    Enabling real-time views of recent and updated entries. You are now able to see the moderation time at work.

Версия 11.21.0 (13.12.2018)

  • Commit 1deb7
    Customer request
    In API 1.4/2.14/3.6 requesting details without unlocked archive access will warn in field entry_warning about limitation.

Версия 11.20.0 (28.10.2018)

Версия 11.19.0 (01.10.2018)

Версия 11.18.1 (20.09.2018)

  • Commit c4d5c
    Changed the cursor behavior for votes from copy to default.

  • Commit c4d5c
    Changed the cursor behavior of ribbons to default.

Версия 11.18.0 (18.09.2018)

  • Commit afb23
    Added custom ribbons to popup with interesting details if needed.

  • Commit 8ee7c
    Improved the behavior of items which have a fade-in effect.

Версия 11.17.0 (01.09.2018)

Версия 11.16.0 (31.08.2018)

  • Commit c00a7
    Customer request
    Introduction of CPE lists in entry views to indicate the affected products.

Версия 11.15.0 (06.08.2018)

  • Commit 9e978
    In API 3.5 support for the queries advisory_date_start, entry_timestamp_create_start, entry_timestamp_change_start.

  • Commit 576a2
    Customer request
    Disabled the gradients in symbols.

Версия 11.14.4 (04.08.2018)

  • Commit 48a03
    Fixed an issue with the visibility of long date symbols.

Версия 11.14.3 (03.08.2018)

  • Commit 7d763
    Improvement of gradient in symbols.

  • Commit 856af
    Adding support for other font families in symbols.

Версия 11.14.2 (02.08.2018)

  • Commit b0000
    Introduction of gradients in symbols.

Версия 11.14.1 (01.08.2018)

  • Commit 7ef2d
    Introduction of antialiasing of fonts for better readability on high-resolution displays.

Версия 11.14.0 (31.07.2018)

  • Commit dc2ae
    Added support for stream symbols shown on overviews.

Версия 11.13.1 (22.07.2018)

  • Commit b675b
    Improved the layout of mini buttons.

Версия 11.13.0 (12.07.2018)

  • Commit b1af8
    Customer request
    Added dynamic layouts for tables to hide certain columns under specific conditions. This improves the mobile view a lot.

Версия 11.12.1 (10.07.2018)

  • Commit d5a10
    Optimized the margin of header elements.

Версия 11.12.0 (06.07.2018)

Версия 11.11.3 (05.07.2018)

  • Commit be3b7
    A new table wrapper optimizes how tables are shown on different screen sizes.

Версия 11.11.2 (04.07.2018)

Версия 11.11.1 (29.06.2018)

  • Commit 7409e
    Streamlining of mini button for unlock announcements.

Версия 11.11.0 (28.06.2018)

Версия 11.10.1 (12.06.2018)

Версия 11.10.0 (11.06.2018)

Версия 11.9.4 (10.06.2018)

Версия 11.9.3 (08.06.2018)

  • Commit 88f01
    Mini buttons do now animate on hover.

Версия 11.9.2 (06.06.2018)

  • Commit 216df
    Customer request
    In API 1.3/2.12/3.2 fixed wrong values in response_remaining (calculation was correct, value shown was wrong). This issue was reported by user portal.

Версия 11.9.1 (04.06.2018)

Версия 11.9.0 (18.05.2018)

  • Commit ab9a7
    Customer request
    Introduced API 3.0, which moved vulnerability_cpe to software_cpe.

Версия 11.8.0 (15.05.2018)

Версия 11.7.1 (14.05.2018)

  • Commit 1d0c8
    Customer request
    In API 2.9 added detailed error messages regarding API key problems (missing, wrong, unknown, valid).

  • Commit 1d0c8
    In API 2.9 enterprise customers have performance priority over free users.

Версия 11.7.0 (08.05.2018)

  • Commit a20db
    In API 2.8 the field entry_title does not show CVE anymore.

  • Commit a20db
    In API 2.8 added fields vulnerability_timeline, countermeasure_reactiondays, countermeasure_0daydays, countermeasure_exposuredays, and countermeasure_exploitdelaydays.

Версия 11.6.0 (07.05.2018)

Версия 11.5.0 (01.05.2018)

Версия 11.4.0 (01.04.2018)

Версия 11.3.0 (22.03.2018)

  • Commit b90e6
    Customer request
    Working on a proof-of-concept to use Alexa as a gateway to work with vulnerability data.

Версия 11.2.3 (17.02.2018)

  • Commit f3590
    Introduction of a container element to have more flexibility with layout positioning on the web frontend.

Версия 11.2.2 (01.02.2018)

  • Commit 51a81
    Introduction of a sub-title on the site title to better describe the service.

Версия 11.2.1 (29.01.2018)

Версия 11.2.0 (22.01.2018)

  • Commit 49bb7
    Upgrade to API 2.0. Response contains three elements (request, response, result) instead just the results.

Версия 11.1.1 (23.09.2017)

  • Commit aebb3
    Improvement of the container margins to have a better layout.

Версия 11.1.0 (16.09.2017)

Версия 11.0.1 (02.06.2017)

Версия 11.0.0 (01.06.2017)

  • Commit a862d
    Introduction of dynamic graphs shown in different views.

Версия 10.12.2 (19.05.2017)

Версия 10.12.1 (16.05.2017)

  • Fixed a display issue on the frontpage. Under certain circumstances new items were not shown as bold.

Версия 10.12.0 (28.04.2017)

Версия 10.11.0 (21.04.2017)

  • Commit e7f52
    Added dynamic charts of all kind of overview pages.

Версия 10.10.0 (10.04.2017)

Версия 10.9.0 (01.04.2017)

Версия 10.8.0 (22.03.2017)

  • Commit 1f1f6
    Customer request
    Vulnerability entries flagged as false-positive do now highlight this fact on their pages (title and introduction).

Версия 10.7.0 (21.03.2017)

  • Commit 2eb19
    Introduced data for OVAL and IAVM. Completed all existing entries with appropriate data.

Версия 10.6.0 (23.02.2017)

  • Commit f7af4
    Customer request
    Supporting CVSS scores from multiple sources (VulDB, vendor, researcher, NVD).

Версия 10.5.1 (13.02.2017)

  • Commit 915e2
    Optimized the indexing of the database to improve search performance.

Версия 10.5.0 (01.02.2017)

Версия 10.4.1 (20.01.2017)

  • Commit ed89a
    Optimized performance by using specific features and configuration settings in PHP7.

Версия 10.4.0 (18.01.2017)

Версия 10.3.0 (01.01.2017)

Версия 10.2.0 (20.12.2016)

  • Commit afa9d
    Introduced Bug of the Day on the front page. One of the more serious or interesting issues of the recent days is shown every day.

Версия 10.1.1 (19.12.2016)

  • Commit e0724
    Redesign of the frontpage with a slick layout and better data accessibility.

Версия 10.1.0 (16.12.2016)

  • Commit 17b00
    Implemented a module to detect loss of data integrity on the service.

Версия 10.0.0 (01.12.2016)

  • Commit 88cce
    Customer request
    Introduction of public API to provide vulnerability for automated processing.

Версия 9.19.1 (08.11.2016)

  • Commit 1bf65
    Optimization of database table structures to gain more flexibility and performance.

Версия 9.19.0 (07.11.2016)

  • Commit 41c1a
    Implementation of Content Security Policy (CSP) to improve web security of the service.

Версия 9.18.0 (02.11.2016)

  • Commit 2c835
    It is now possible to upvote comments for vulnerability entries. Upvoted comments are shown on top of the list.

Версия 9.17.0 (01.11.2016)

  • Commit 01762
    Start closed beta of community edition.

Версия 9.16.0 (26.10.2016)

  • Commit 464dc
    Editing a section of a vulnerability will automatically jump to the correct section of the edit form.

Версия 9.15.0 (25.10.2016)

  • Commit cbba3
    Existing vulnerability entries can now be edited immediately by members of the moderation team.

Версия 9.14.0 (14.10.2016)

  • Commit 83203
    Enhanced the existing cache module to allow caching of database queries and results.

Версия 9.13.0 (11.10.2016)

  • Commit 786cb
    Every user account has now a profile.

  • Commit 7868e
    Registered users are able to tweak their own configuration of the service.

Версия 9.12.0 (10.10.2016)

  • Commit b9c2d
    Registered users are able to see history of vulnerability entries they have been viewing earlier.

Версия 9.11.0 (07.10.2016)

Версия 9.10.0 (06.10.2016)

Версия 9.9.0 (05.10.2016)

  • Commit da14a
    Users accessing resources which require an authentication receive a proper error message.

Версия 9.8.0 (04.10.2016)

  • Commit 2f00f
    Users are able to reset their password via email (password recovery).

Версия 9.7.0 (03.10.2016)

  • Commit 5a1b1
    Customer request
    Logins with a new device or from an unknown source will inform the account holder about the potentially suspicious login. New devices are stored and shown in the personal device management overview.

Версия 9.6.0 (24.06.2016)

  • Commit 688a5
    Added a limiter to prevent malicious users from scraping our data without authorization.

Версия 9.5.0 (22.06.2016)

Версия 9.4.0 (01.10.2016)

Версия 9.3.1 (05.07.2016)

  • Commit 4aa37
    Performance optimization for all web views.

Версия 9.3.0 (30.06.2016)

  • Commit 4aecf
    Some statistical data is now stored in a centralized table which allows them to be shown on multiple places without new calculations every time.

Версия 9.2.0 (02.05.2016)

  • Commit 3fee0
    Support for data fields of Tenable Nessus.

Версия 9.1.1 (29.04.2016)

Версия 9.1.0 (27.04.2016)

Версия 9.0.0 (14.04.2016)

  • Commit b3559
    Complete rewrite of the search engine to provide better matches and optimized performance.

Версия 8.1.2 (06.04.2016)

  • Commit 3ce21
    Optimization of HTML code to make pages smaller and faster to download and render.

Версия 8.1.1 (04.04.2016)

  • Fixed a bug or slow indexes which improved the performance of vulnerability display a lot.

Версия 8.1.0 (01.04.2016)

  • Commit 7bc0a
    Introduction of new summaries and descriptions with more data enrichment.

  • Commit 56864
    Performance optimization.

Версия 8.0.0 (14.03.2016)

  • Commit 5e4e5
    Introducing Chart.js to generate dynamic charts.

Версия 7.1.3 (11.03.2016)

  • Commit a0b92
    Establish VulDB as independent service to gain more flexibility.

Версия 7.1.2 (23.02.2016)

Версия 7.1.1 (17.02.2016)

  • Commit 07bfb
    Renaming the Twitter handle from scipvulbot to "vuldb"

Версия 7.1.0 (19.01.2016)

  • Commit 55bf1
    Enhancing statistical overview to provide previews and forecasts based in historical data.

  • Commit 72424
    Creating new text for different pages and sub-pages.

Версия 7.0.5 (01.12.2015)

  • Commit ea951
    Customer request
    Adding caching modules to improve site performance. Caching is possible per site and file.

Версия 7.0.4 (20.11.2015)

  • Commit 58def
    Customer request
    Increasing update frequency of existing entries.

Версия 7.0.3 (19.08.2015)

  • Corrected the listing of multiple authors of a vulnerability.

Версия 7.0.2 (07.08.2015)

  • Commit 3b6e7
    More performance optimization of database queries.

Версия 7.0.1 (03.08.2015)

  • Commit b1554
    Performance optimization of database queries.

Версия 7.0.0 (10.07.2015)

  • Commit 243a7
    Redesign of modular frontpage with the introduction of Top 5 lists.

Версия 6.31.0 (07.07.2015)

  • Commit 44e99
    Adding Qualys data to vulnerability entries.

  • Commit fe3d0
    Adding SecurityCenter data to vulnerability entries.

Версия 6.30.0 (09.03.2015)

  • Commit e19c1
    Introduction of new queue for vulnerability processing by mod team.

Версия 6.29.3 (25.02.2015)

  • Commit 8695f
    Optimization of all X-Force data import and display.

Версия 6.29.2 (03.02.2015)

  • Commit 3453e
    Optimizaton of summaries and descriptions of vulnerability entries.

Версия 6.29.1 (08.01.2015)

  • Commit 7ac76
    Optimization of version descriptions of vulnerability entries.

Версия 6.29.0 (24.06.2014)

  • Commit 0b232
    Customer request
    Approaching backlog of old entries before 2003 with vulnerabilities ranging back to 1988. More information.

Версия 6.28.0 (26.05.2014)

  • Commit 0f72a
    Introduction of the "see also" hint which lists entries with are connected or similar.

Версия 6.27.0 (17.04.2014)

  • Commit 35f6f
    Adding a field to declare the date of the introduction of a vulnerability.

Версия 6.26.1 (27.03.2014)

  • Commit 3efc3
    Optimization of queuing of new vulnerabilities to better prioritize processing.

Версия 6.26.0 (20.03.2014)

Версия 6.25.12 (14.03.2014)

Версия 6.25.11 (07.03.2014)

  • Commit d0dda
    Optimizing collision detection during the processing of new entries.

Версия 6.25.10 (10.02.2014)

  • Commit ce076
    Optimizing summaries regarding sources of vulnerability entries.

Версия 6.25.9 (29.01.2014)

  • Commit 03d37
    Added helper for vulnerability moderation team to determine arguments of attacks faster and more reliable.

Версия 6.25.8 (28.01.2014)

  • Commit 53a64
    Optimizing summaries regarding code samples.

Версия 6.25.7 (23.01.2014)

  • Commit 61b0d
    Optimizing helper for vulnerability moderation team to complete new and existing entries with additional data. This increases data quality drastically.

Версия 6.25.6 (14.01.2014)

  • Fixed a bug where sometimes summaries and descriptions did contain spaces twice instead of once. This was just a problem in the HTML source code and not on the rendered web site.

Версия 6.25.5 (09.01.2014)

  • Commit 1cd31
    Added helper for vulnerability moderation team to determine keywords which shall be used within the title of a vulnerability entry.

Версия 6.25.4 (19.12.2013)

  • Commit 12a4f
    Optimizing the autocomplete feature to update new entries with historical data.

Версия 6.25.3 (06.11.2013)

  • Commit 1434c
    Optimizing the pre-parser to handle import of new vulnerability entries.

Версия 6.25.2 (22.10.2013)

  • Commit a52cf
    Changing the algorithm to calculate the current threat level.

Версия 6.25.1 (21.10.2013)

  • Commit 921d7
    Changing the algorithm to calculate the risk rating of vulnerability entries.

Версия 6.25.0 (18.10.2013)

Версия 6.24.0 (17.10.2013)

  • Commit 01303
    Introducing the threat level to show an indicator for the current vulnerability landscape.

Версия 6.23.0 (03.10.2013)

  • Commit e8e8f
    Adding the possibility to add a custom word to the title to provide more details on first sight.

Версия 6.22.0 (01.10.2013)

  • Commit f8c1e
    Establishing a background updater which handles entries which need to be updated without interfering with the manual work of the moderation team.

  • Commit 5abb3
    Enhancement of the review procedure of CVE entries pushed by MITRE to improve processing and quality.

Версия 6.21.0 (13.09.2013)

Версия 6.20.1 (12.09.2013)

  • Commit 088ac
    Completing all existing entries with Secunia data.

Версия 6.20.0 (11.09.2013)

  • Commit 2b409
    Introducing risk maps to provide easy comparability between risk ratings of different sources.

Версия 6.19.0 (10.09.2013)

  • Commit 8966c
    Introducing support for Secunia data as a source.

  • Commit 8966c
    Introducing support for IBM X-Force data as a source.

Версия 6.18.0 (23.08.2013)

Версия 6.17.0 (12.08.2013)

Версия 6.16.0 (09.08.2013)

Версия 6.15.2 (05.07.2013)

  • Commit 4dffe
    Enhancement of the review procedure of Nessus entries.

Версия 6.15.1 (28.06.2013)

  • Commit 4b14b
    Optimizing the plausability checks during vulnerability moderation to prevent contradicting and wrong data.

Версия 6.15.0 (19.06.2013)

  • Commit 0b42c
    Added support for CPE to better identification of products.

Версия 6.14.1 (11.06.2013)

  • Commit 0b61c
    Updating large quantities of vulnerabilities is now improved thanks to incremental updates.

Версия 6.14.0 (03.06.2013)

  • Commit 207db
    Added support for screenshots per entries to illustrate attacks and countermeasures. More information.

  • Commit 207db
    Added support to embed external videos per entries to illustrate attacks and countermeasures. Videos can be hosted at YouTube and Vimeo. More information.

Версия 6.13.0 (31.05.2013)

  • Commit 22b2b
    Added the capability to add quotes from advisories to enrich entries.

  • Commit 22b2b
    Added the capability to add links to videos for a vulnerability.

Версия 6.12.0 (29.04.2013)

Версия 6.11.0 (11.04.2013)

  • Commit 6a9d2
    Added the capability to list multiple different products in an affected list. This is done additionally to the main product that is affected by a vulnerability.

Версия 6.10.2 (04.04.2013)

  • Commit 239ac
    Enhanced input validation mechanism during vulnerability management to prevent mistakes regarding vendor/product definitions.

Версия 6.10.1 (28.03.2013)

  • Commit 497c0
    Optimization of logging and tracking of queued items processed by the moderation team.

Версия 6.10.0 (19.03.2013)

  • Commit c46f6
    Added input validation mechanisms during vulnerability management.

  • Commit bc987
    Optimized input validation mechanisms during vulnerability management.

Версия 6.9.1 (09.01.2013)

  • Fixed an issue in the database. This did only affect moderation of vulnerabilities and was not reflected on the user-side of the service.

Версия 6.9.0 (21.12.2012)

  • Commit 79a9b
    Added a feature to normalize terms between different vulnerability entries.

Версия 6.8.1 (26.11.2012)

  • Commit d0a20
    Prepared the support for Milw0rm data for entries with an ID up to 50000.

Версия 6.8.0 (31.10.2012)

Версия 6.7.0 (15.10.2012)

Версия 6.6.0 (01.10.2012)

Версия 6.5.0 (24.09.2012)

Версия 6.4.0 (04.07.2012)

  • Commit a681e
    Migrating all available data from NASLDB.

Версия 6.3.0 (18.06.2012)

Версия 6.2.2 (05.06.2012)

  • Commit 895ea
    Optimizing the autocomplete feature to update new entries with historical data.

Версия 6.2.1 (10.04.2012)

Версия 6.2.0 (13.03.2012)

  • Commit e00e9
    Added support for better linking to external sources.

Версия 6.1.1 (09.03.2012)

Версия 6.1.0 (08.03.2012)

  • Commit c17b6
    Added the calculation of the exposure time which measures the time of the disclosure and the mitigation possibilities of a vulnerability.

  • Commit 23aa8
    Reviewed all available data of OSVDB.

Версия 6.0.0 (06.03.2012)

  • Commit 934a4
    Optimization of summaries and descriptions.

  • Commit 3484c
    Added support to show images of vendors/products.

  • Commit 3484c
    Added support for Google dorks to find issues very quickly.

Версия 5.2.2 (05.03.2012)

Версия 5.2.1 (02.03.2012)

Версия 5.2.0 (15.02.2012)

  • Commit d6183
    Added web import feature for vulnerability moderators to handle new entries based on web resources.

Версия 5.1.0 (06.01.2012)

  • Commit 2e4ed
    Added single import feature for vulnerability moderators to handle single entries outside the regular queueing.

Версия 5.0.0 (22.02.2011)

  • Commit 04086
    Establishing new database backend with much more possibilities.

Версия 4.10.2 (01.12.2010)

  • Commit 8b4df
    Move to more powerful hardware due to increase in access.

Версия 4.10.1 (30.07.2010)

Версия 4.10.0 (10.06.2010)

  • Commit 57677
    Adding Alert Info on web site to inform visitors about latest critical issue.

  • Commit 80bfa
    Delivering ads for non-paying and unauthenticated users.

  • Commit acc6f
    Optimizing database structure for more flexibility and performance.

Версия 4.9.0 (08.03.2010)

Версия 4.8.1 (10.02.2010)

Версия 4.8.0 (08.02.2010)

  • Commit 47351
    Adding the alert info on top of the site to show the most recent vulnerability with the highest emergency rating.

Версия 4.7.2 (05.02.2020)

  • Commit 1a52b
    Improvement of VulDB alert system.

Версия 4.7.1 (02.02.2010)

Версия 4.7.0 (11.01.2011)

  • Commit 90de3
    Customer request
    Added VulDB Alert to inform customers about issues applicable for them.

Версия 4.6.0 (16.12.2009)

Версия 4.5.0 (27.10.2009)

Версия 4.4.0 (03.09.2009)

Версия 4.3.0 (25.08.2009)

  • Commit 61ad7
    Completing existing entries with most actual data. This includes but is not limited to CVE, Secunia, SecurityTracker, vendor, and confirmation details. More information.

Версия 4.2.0 (20.08.2009)

Версия 4.1.0 (01.08.2009)

Версия 4.0.1 (26.06.2009)

Версия 4.0.0 (23.06.2009)

Версия 3.5.0 (01.07.2006)

Версия 3.4.0 (19.05.2004)

Версия 3.3.0 (01.01.2004)

  • Commit a2ec5
    Introduction of Emergency-SMS notification service.

Версия 3.2.0 (19.12.2003)

Версия 3.1.0 (18.11.2003)

Версия 3.0.0 (01.03.2003)

  • Commit 94f12
    Bugbase is completely re-written in Perl and uses a dedicated backend for vulnerability moderation to gain more flexibility.

  • Commit 94f12
    Bugbase is re-branded as scip VulnDB and hosted on

Версия 2.0.0 (01.09.2002)

  • Commit 51e87
    Changed from static web site to dynamic database (with the kind support of DukeCS).

Версия 1.0.0 (01.01.1997)

Interested in the pricing of exploits?

See the underground prices here!