|
3 | 3 | VulnerableCode Overview |
4 | 4 | ======================== |
5 | 5 |
|
6 | | -VulnerableCode is a FOSS project that provides tools to build a database |
7 | | -of software vulnerabilities and the packages they impact. The tools |
8 | | -handle collecting, aggregating and correlating these vulnerabilities. |
9 | | -Our project also supports a public Cloud instance of this database – |
10 | | -VulnerableCode.io. |
| 6 | +*VulnerableCode* provides an open database of software packages that are affected |
| 7 | +by known security vulnerabilities aka. *"vulnerable packages"*. |
| 8 | + |
| 9 | +VulnerableCode is also a free and open source software (FOSS) project that |
| 10 | +provides the tools to build this open database. The tools handle collecting, |
| 11 | +aggregating and correlating these vulnerabilities and relating them to a correct |
| 12 | +package version. Our project also supports a public cloud instance of this |
| 13 | +database - VulnerableCode.io. |
| 14 | + |
| 15 | + |
| 16 | +What can I do with VulnerableCode? |
| 17 | +------------------------------------ |
| 18 | + |
| 19 | +**For security researchers and software developers, VulnerableCode offers a web |
| 20 | +UI and a JSON API to efficient find if the FOSS packages and dependencies that |
| 21 | +you use may be affected by known vulnerabilities and which version of a package |
| 22 | +you should upgrade to to fix this issue.** |
| 23 | + |
| 24 | + |
| 25 | +- With the web UI, you can search by package using Package URLs or search by |
| 26 | + vulnerability like by CVE. From there you can navigate to the package |
| 27 | + vulnerabilities and to the vulnerable packages. |
| 28 | + |
| 29 | +- With the JSON API, you can perform package queries using Package URLs or query |
| 30 | + by vulnerability id. You can also query by CPEs and vulnerability aliases. |
| 31 | + The API provides paginated index and detail endpoints and includes indexes |
| 32 | + of vulnerable CPEs and vulnerable Package URLs (purl). |
| 33 | + |
| 34 | +You can also install VulnerableCode locally or use the provided publicly hosted instance, |
| 35 | +or host your own installation. You can also contact the VulnerableCode authors and team |
| 36 | +for special needs including commercial support. |
| 37 | + |
11 | 38 |
|
12 | 39 | Why VulnerableCode? |
13 | 40 | ------------------- |
14 | 41 |
|
15 | | -Existing vulnerability database solutions are primarily commercial or |
16 | | -proprietary which does not make sense because the data is about FOSS |
17 | | -(Free and Open Source Software). |
| 42 | +VulnerableCode provides open correlated data and eventually does provide curated |
| 43 | +data. Our approach is to privilege upstream data sources and to merge multiple |
| 44 | +vulnerability data sources after comparison and correlation. The vulnerability |
| 45 | +data is keyed by Package URL ensuring quick and accurate lookup with minimal |
| 46 | +friction. We further continuously validate and refine the collected data for |
| 47 | +quality, accuracy and consistency using "improver" jobs. |
| 48 | +An example of such improver can validate that a package version reported as |
| 49 | +vulnerable effectively exists (several do not exist); Or an improver can |
| 50 | +re-evaluate a vulnerable version ranges based on the latest releases of a |
| 51 | +package. |
| 52 | + |
| 53 | +The benefits of our approach is that we will eventually provide better, more |
| 54 | +accurate vulnerability data, more efficiently related to actual packages scanned |
| 55 | +or reported in an SBOM. This should contribute to more efficient vulnerability |
| 56 | +management with less noise from false positives. |
| 57 | + |
| 58 | +Furthermore, existing vulnerability database solutions are primarily commercial |
| 59 | +or proprietary which does not make sense because the bulk of the vulnerability |
| 60 | +data is about FOSS. |
18 | 61 |
|
19 | 62 | The National Vulnerability Database, which is a primary centralized data |
20 | 63 | source for known vulnerabilities, is not particularly well suited to |
|
0 commit comments