anchore / nvd-data-overrides
☆47Updated this week
Alternatives and similar repositories for nvd-data-overrides:
Users that are interested in nvd-data-overrides are comparing it to the libraries listed below
- A standard API specification for exchanging supply chain artifacts and intelligence☆68Updated last month
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆130Updated last year
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆70Updated 8 months ago
- Stakeholder-Specific Vulnerability Categorization☆136Updated this week
- Tool for collecting vulnerability data from various sources (used to build the grype database)☆84Updated this week
- Global Security Database Tools☆42Updated last year
- PURL to CPE Relationship mapping project.☆82Updated this week
- Exploit Prediction Scoring System (EPSS)☆24Updated 2 years ago
- OpenVEX Specification☆140Updated 6 months ago
- ☆100Updated 4 months ago
- Format agnostic SBOM tooling☆96Updated this week
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆63Updated this week
- The OpenSSF Vulnerability Disclosures Working Group seeks to help improve the overall security of the open source software ecosystem by h…☆183Updated 2 months ago
- A tool for preventing the installation of malicious PyPI and npm packages☆120Updated last month
- Generate a score for your sbom to understand if it will actually be useful.☆224Updated 5 months ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆90Updated last year
- OASIS CSAF TC: Supporting version control for Work Product artifacts developed by members of TC, including prose specifications and secon…☆155Updated last week
- Feed parsing for language package manager updates☆76Updated last month
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆284Updated this week
- CISA CSAF Security Advisories☆58Updated this week
- ☆91Updated 2 months ago
- A place to systematically store software bill of materials (SBOM) documents.☆44Updated last year
- ☆13Updated this week
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆60Updated last month
- Enrich SBOMs with data from third party services☆152Updated this week
- Potential WG on Artificial Intelligence and Machine Learning (AI/ML)☆59Updated 3 months ago
- OPENSSF SECURITY INSIGHTS: Repository for development of the draft standard, where requests for modification should be made via Github Is…☆56Updated 2 weeks ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆170Updated 2 months ago
- Utility that provides an API platform for validating, querying and managing BOM data☆99Updated 2 months ago
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆11Updated 3 months ago