anchore / nvd-data-overridesLinks
☆48Updated this week
Alternatives and similar repositories for nvd-data-overrides
Users that are interested in nvd-data-overrides are comparing it to the libraries listed below
Sorting:
- Stakeholder-Specific Vulnerability Categorization☆168Updated this week
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆215Updated this week
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆139Updated last year
- The OpenSSF Vulnerability Disclosures Working Group seeks to help improve the overall security of the open source software ecosystem by h…☆206Updated 3 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆82Updated last year
- A standard API specification for exchanging supply chain artifacts and intelligence☆95Updated 3 weeks ago
- Global Security Database Tools☆43Updated 2 years ago
- OASIS CSAF TC: Supporting version control for Work Product artifacts developed by members of TC, including prose specifications and secon…☆204Updated this week
- A repository with examples of CycloneDX BOMs (SBOM, SaaSBOM, OBOM, VEX, etc)☆214Updated 2 months ago
- A community collection of security reviews of open source software components.☆96Updated last year
- Tool to guess CPE name based on common software name☆109Updated 3 months ago
- CVE.ICU code.☆50Updated this week
- ☆102Updated last year
- Monthly CVE Stats☆43Updated last week
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆177Updated last month
- Utility that provides an API platform for validating, querying and managing BOM data☆124Updated last week
- ☆134Updated last week
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆96Updated 11 months ago
- A dataset of software supply chain compromises. Please help us maintain it!☆130Updated 3 years ago
- Examples and proof-of-concept for Software Bill of Materials (SBOM) code & data☆66Updated last year
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆210Updated this week
- ☆25Updated 2 years ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆62Updated this week
- App that simplifies building decision trees to model adverse scenarios☆225Updated last year
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆432Updated this week
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.2, purl, and vers…☆134Updated 3 weeks ago
- CISA CSAF Security Advisories☆92Updated this week
- Data about all known supply-chain attacks through history☆63Updated 7 months ago
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆70Updated last month
- A place to systematically store software bill of materials (SBOM) documents.☆50Updated 2 years ago