Methodology

How It Works

Where the data comes from, how it's verified, how often it's updated, and what we don't cover. Transparency is the foundation of a trustworthy reference.

Primary sources only

Every lifecycle date on endoflife.ai is sourced directly from official vendor documentation. We do not rely on third-party aggregators, community wikis, or scraped data as primary sources. When a vendor publishes an end-of-life date, that date is our source of truth.

For products maintained by open-source foundations, we reference the official project lifecycle pages published by the maintaining organization — the Python Software Foundation, the OpenJS Foundation, the PHP Group, and so on.

01
Official vendor lifecycle pages

Microsoft, Oracle, Red Hat, Canonical, Apple, Cisco, HPE, Dell, and other vendors publish official product lifecycle documentation. These pages are the primary source for all commercial product dates.

02
Open source foundation pages

The PSF, OpenJS Foundation, PHP Group, Ruby core team, Django project, and other foundations publish official lifecycle schedules. These are authoritative for their respective ecosystems.

03
endoflife.date

The community-maintained endoflife.date project provides a structured, machine-readable database of EOL dates verified against primary sources. We reference this as a cross-check for coverage and accuracy.

endoflife.date →
04
NIST National Vulnerability Database

CVE data and CVSS scores referenced in our security analysis content are sourced from the NVD. CISA's Known Exploited Vulnerabilities catalog is used for active exploitation status.

nvd.nist.gov →

How we determine end-of-life

Not all vendors use the same terminology. "End of life," "end of support," "end of maintenance," "end of extended support," and "end of service life" are all used differently across vendors. We standardize these into a single EOL date representing the last day a product receives security patches.

01
Identify the security patch cutoff

For products with multiple support phases, we use the date when security patches stop — not the date when general support ends or when hardware replacement stops. This is the date that matters for security posture.

02
Verify against the primary source

Every date is verified against the vendor's official lifecycle documentation. We record the source URL for each product entry. When a vendor updates their lifecycle dates, we update ours.

03
Cross-reference conflicting sources

When different sources show different dates for the same product, we investigate. Common causes include vendor-extended support programs, regional differences, and documentation that hasn't been updated to reflect a change. We document the conflict and use the most conservative date.

04
AI-assisted classification with human review

Our EOL Checker uses AI to interpret product names, versions, and lifecycle context from live data. All AI-generated outputs are validated against our structured product database. The AI does not determine EOL dates — it surfaces and interprets them.

How often data is updated

Lifecycle dates change. Vendors extend support, accelerate EOL timelines, or add new products. We maintain a quarterly review cycle for all products in the index, with out-of-cycle updates for significant changes.

Quarterly
Full index review
As announced
Major vendor changes
Monthly
EOL digest newsletter
Last updated: May 2026. If you notice a date that appears incorrect or outdated, contact us at partners@endoflife.ai with a link to the primary source. We verify and update within 48 hours.

Abandoned projects and moving targets

Some open-source projects don't formally announce end-of-life — they simply stop receiving commits and issue responses. For these projects, we use the date of the last security-related commit or release as a proxy EOL date, and flag the entry as "effectively EOL — no formal announcement."

For products with paid extended support (Microsoft ESU, Red Hat ELS, Oracle Premier Support), we show the free/community support EOL date as the primary date and note the availability of extended support options. Paid extended support does not change the security posture for organizations that haven't purchased it.

What we don't cover — and why

No EOL reference is complete. Being explicit about limitations is more useful than pretending they don't exist.

Proprietary enterprise software. SAP, Oracle EBS, Salesforce, and other enterprise platforms have complex, negotiated lifecycle terms that vary by contract. We do not attempt to cover these.
Regional variations. Some vendors offer different support timelines in different regions. Our dates reflect global or US/international support windows unless otherwise noted.
Minor version granularity. For most products we track major and LTS versions. Patch-level version tracking (e.g. Node.js 20.1.0 vs 20.2.0) is not in scope — the major version EOL date applies to all patch releases.
Hardware firmware granularity. Hardware EOSL dates cover the platform. Individual firmware component EOL dates (NIC firmware, drive firmware) are not tracked separately.
Very new or niche products. Our index prioritizes widely-deployed products. Products with limited enterprise adoption may not be included. Use the EOL Checker for products not in the index — it queries live data sources.
Future date accuracy. Vendors occasionally change announced EOL dates. Dates more than 18 months in the future should be treated as indicative, not definitive. Verify against the primary source before making procurement or migration decisions.

Check your stack now

Instant EOL status for any product. Free, no account required.

Open EOL Checker →