anchore / nvd-data-overridesLinks
☆47Updated this week
Alternatives and similar repositories for nvd-data-overrides
Users that are interested in nvd-data-overrides are comparing it to the libraries listed below
Sorting:
- Stakeholder-Specific Vulnerability Categorization☆163Updated this week
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆209Updated this week
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆137Updated last year
- The OpenSSF Vulnerability Disclosures Working Group seeks to help improve the overall security of the open source software ecosystem by h…☆198Updated 2 weeks ago
- A standard API specification for exchanging supply chain artifacts and intelligence☆84Updated this week
- OASIS CSAF TC: Supporting version control for Work Product artifacts developed by members of TC, including prose specifications and secon…☆191Updated this week
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆79Updated last year
- Global Security Database Tools☆44Updated last year
- A community collection of security reviews of open source software components.☆95Updated last year
- CISA CSAF Security Advisories☆84Updated this week
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆95Updated 7 months ago
- VulnCheck's official command line tool☆139Updated 2 weeks ago
- ☆121Updated 2 weeks ago
- A repository with examples of CycloneDX BOMs (SBOM, SaaSBOM, OBOM, VEX, etc)☆202Updated 5 months ago
- ☆101Updated 11 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆176Updated 9 months ago
- A dataset of software supply chain compromises. Please help us maintain it!☆130Updated 3 years ago
- A place to systematically store software bill of materials (SBOM) documents.☆46Updated 2 years ago
- A tool for preventing the installation of malicious npm and PyPI packages☆160Updated last week
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆333Updated this week
- A tool to check the security settings of Github Organizations.☆72Updated 2 years ago
- App that simplifies building decision trees to model adverse scenarios☆216Updated last year
- Library to ingest and generate VEX documents☆15Updated 7 months ago
- CVE.ICU code.☆46Updated this week
- ☆16Updated 2 years ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆77Updated last week
- Data about all known supply-chain attacks through history☆60Updated 3 months ago
- Tool to guess CPE name based on common software name☆104Updated this week
- Utility that provides an API platform for validating, querying and managing BOM data☆119Updated 3 weeks ago
- Feed parsing for language package manager updates☆78Updated 9 months ago