anchore / nvd-data-overrides
☆45Updated this week
Related projects ⓘ
Alternatives and complementary repositories for nvd-data-overrides
- A standard API specification for exchanging supply chain artifacts and intelligence☆54Updated this week
- The OpenSSF Vulnerability Disclosures Working Group seeks to help improve the overall security of the open source software ecosystem by h…☆179Updated 3 months ago
- Stakeholder-Specific Vulnerability Categorization☆128Updated this week
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆67Updated 6 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆125Updated 9 months ago
- Tool for collecting vulnerability data from various sources (used to build the grype database)☆75Updated this week
- A place to systematically store software bill of materials (SBOM) documents.☆44Updated last year
- Global Security Database Tools☆41Updated 10 months ago
- OpenVEX Specification☆130Updated 3 months ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆59Updated last week
- Generate a score for your sbom to understand if it will actually be useful.☆221Updated 2 months ago
- Format agnostic SBOM tooling☆77Updated this week
- ☆101Updated last month
- OASIS CSAF TC: Supporting version control for Work Product artifacts developed by members of TC, including prose specifications and secon…☆148Updated this week
- The security workflow engine!☆73Updated this week
- Exploit Prediction Scoring System (EPSS)☆23Updated 2 years ago
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆247Updated this week
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆61Updated this week
- A repository with examples of CycloneDX BOMs (SBOM, SaaSBOM, OBOM, VEX, etc)☆174Updated 4 months ago
- ☆79Updated this week
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆86Updated 9 months ago
- PURL to CPE Relationship mapping project.☆76Updated this week
- Low-effort reachability analysis for third-party code vulnerabilities.☆19Updated last year
- CISA CSAF Security Advisories☆54Updated this week
- Utility that provides an API platform for validating, querying and managing BOM data☆94Updated this week
- A dataset of software supply chain compromises. Please help us maintain it!☆126Updated 2 years ago
- Technical Advisory Council☆109Updated this week
- ☆16Updated last year
- A community collection of security reviews of open source software components.☆92Updated 8 months ago
- Python implementation of Stakeholder-Specific Vulnerability Categorization (SSVC)☆18Updated this week