A distributed vulnerability database for Open Source

An open, precise, and distributed approach to producing and consuming vulnerability information for open source.

Ecosystems

AlmaLinux
4675 View AlmaLinux vulnerabilities
Alpaquita
8775 View Alpaquita vulnerabilities
Alpine
4048 View Alpine vulnerabilities
Android
2912 View Android vulnerabilities
Azure Linux
12016 View Azure Linux vulnerabilities
BellSoft Hardened Containers
428 View BellSoft Hardened Containers vulnerabilities
Bitnami
6964 View Bitnami vulnerabilities
Chainguard
5672 View Chainguard vulnerabilities
CleanStart
757 View CleanStart vulnerabilities
crates.io
2214 View crates.io vulnerabilities
Debian
54244 View Debian vulnerabilities
Echo
3129 View Echo vulnerabilities
GIT
82299 View GIT vulnerabilities
GitHub Actions
49 View GitHub Actions vulnerabilities
Go
6546 View Go vulnerabilities
Hex
57 View Hex vulnerabilities
Julia
483 View Julia vulnerabilities
Linux
18486 View Linux vulnerabilities
Mageia
5871 View Mageia vulnerabilities
Maven
6322 View Maven vulnerabilities
MinimOS
24145 View MinimOS vulnerabilities
npm
217322 View npm vulnerabilities
NuGet
1657 View NuGet vulnerabilities
openEuler
6387 View openEuler vulnerabilities
openSUSE
12454 View openSUSE vulnerabilities
OSS-Fuzz
3834 View OSS-Fuzz vulnerabilities
Packagist
6074 View Packagist vulnerabilities
PyPI
18662 View PyPI vulnerabilities
Red Hat
19214 View Red Hat vulnerabilities
Rocky Linux
2922 View Rocky Linux vulnerabilities
Root
11949 View Root vulnerabilities
RubyGems
1933 View RubyGems vulnerabilities
SUSE
20335 View SUSE vulnerabilities
SwiftURL
50 View SwiftURL vulnerabilities
Ubuntu
52282 View Ubuntu vulnerabilities
Wolfi
3627 View Wolfi vulnerabilities

OSV schema

All advisories in this database use the OpenSSF OSV format, which was developed in collaboration with open source communities.

The OSV schema provides a human and machine readable data format to describe vulnerabilities in a way that precisely maps to open source package versions or commit hashes.

{
  "schema_version": "1.7.4",
  "id": "GHSA-c3g4-w6cv-6v7h",
  "modified": "2022-04-01T13:56:42Z",
  "published": "2022-04-01T13:56:42Z",
  "aliases": [ "CVE-2022-27651" ],
  "summary": "Non-empty default inheritable capabilities for linux container in Buildah",
  "details": "A bug was found in Buildah where containers were created ...",
  "affected": [
    {
      "package": {
        "ecosystem": "Go",
        "name": "github.com/containers/buildah"
      },
      "ranges": [
        {
          "type": "SEMVER",
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "1.25.0"
            }
          ]
        }
      ]
    }
  ],
  "references": [
    {
      "type": "WEB",
      "url": "https://github.com/containers/buildah/commit/..."
    },
    {
      "type": "PACKAGE",
      "url": "https://github.com/containers/buildah"
    }
  ]
}

Data sources

This infrastructure serves as an aggregator of vulnerability databases that have adopted the OSV schema, including GitHub Security Advisories, PyPA, RustSec, and Global Security Database, and more.

Use the API

An easy-to-use API is available to query for all known vulnerabilities by either a commit hash, or a package version.

Query by commit hash

curl -d \
  '{"commit": "6879efc2c1596d11a6a6ad296f80063b558d5e0f"}' \
  "https://api.osv.dev/v1/query"
content_copy

Query by version number

curl -d \
  '{"version": "2.4.1",
    "package": {"name": "jinja2", "ecosystem": "PyPI"}}' \
  "https://api.osv.dev/v1/query"
content_copy

Vulnerability Scanner

Install OSV‑Scanner

go install github.com/google/osv-scanner/v2/cmd/osv-scanner@v2
          
content_copy

Scan SBOM or Lockfiles

osv-scanner --sbom=cycloned-or-spdx-sbom.json
osv-scanner --lockfile=package-lock.json
          
content_copy

Scan directory recursively

osv-scanner -r path/to/your/project
          
content_copy

Remediation Tools

Guided Remediation (basic)

osv-scanner fix --non-interactive --strategy=in-place -L path/to/package-lock.json
osv-scanner fix --non-interactive --strategy=relock -M path/to/package.json -L path/to/package-lock.json
          
content_copy

Guided Remediation (interactive)

osv-scanner fix -M path/to/package.json -L path/to/package-lock.json
          
content_copy

Container Image Scanning

You can use OSV-Scanner to scan your container images for known vulnerabilities.

Scan container image

osv-scanner scan image --serve alpine:3.12
          
content_copy
Screenshot of container scan HTML output

GitHub Workflows

OSV-Scanner also provides reusable GitHub workflows that can be easily integrated into CI/CD pipelines to provide continuous vulnerability scanning coverage. This can scan newly added dependencies in pull requests for introduced vulnerabilities, as well as perform regular vulnerability scans for the entire project.

Screenshot of OSV-Scanner GitHub Action

Open source

This project is open source. If you have any ideas or questions, please feel free to reach out by creating an issue!