Vulners.com is a new search engine for security content.
Guys from vulners.com collect vendor security bulletins, lists of vulnerabilities found by researchers, content of open vulnerability and exploit databases, posts on hack forums and even detection rules from vulnerability scanners. They investigate dependencies among all this entities and provide fast and efficient searching interface. Moreover, you can even automate searching process with Vulners Search API. All for free!
Why might you need it?
1. Well, obviously you can use it for searching phrases in security content,
Various filters are available: bulletin type, CVSS Score, date.
Bulletin type (27 different types):
Common Vulnerability Scoring System (CVSS) Score (0-10):
You can sort results by publish date and CVSS Score:
Some more “order by” options that not described here: modified – date of modification, bounty – the size of bug bounty reward.
So, we can produce request “type:centos cvss.score:10 order:published” only by clicking on the filters:
2. You can use this instrument to get relevant information about particular vulnerability. On which platform it exists, how it could be exploited, how it could be patched on different platforms, what security experts are talking about this vulnerability on hack forums. And all this will be updated on regular bases fully automatically.
Searching CVEs related to Heartbleed “type:cve Heartbleed“:
Detailed description with vulnerable software versions and links to related entities:
By the way, this line of icons in the upper right corner is a graphical representation of CVSS vector and base score, for example CVSS v2 Base Score 7.2 (HIGH) (AV:L/AC:L/Au:N/C:C/I:C/A:C):
3. Using vulners.com you can easily describe your IT department why vulnerabilities you found with vulnerability scanner are dangerous and should be patched. You can find exploits available for this vulnerabilities by CVE number or other IDs. Not only the fact that vulnerability is exploitable, but see full code of exploit.
Searching for exploits “CVE-2014-0160 type:exploitdb“:
Detailed exploit description and source code:
4. Maybe you are from HR and you looking for the best pentester or ethical hacker. Try to search your candidate on vulners.com. You can find what vulnerabilities he has reported and how lucky he was on bug bounty programs. And if you are that guy you can add this link to your resume by yourself 😉
Searching for person with sorting by bug bounty reward size “isox order:bounty“:
5. If you are doing pentests you can easily find exploits for the particular platform. Are you interested in examples of real SQL injections or vulnerabilities that were found, for example, on Vimeo? Easy! All to inspire you and make your job more efficient.
Windows 10 exploits “type:exploitdb windows 10“:
SQL injections from hackerone “type:hackerone sql injection“:
Vimeo vulnerabilities from hackerone “type:hackerone Vimeo“:
And much much more. If you know a good use case feel free to write it in comments bellow.