Skip to content

An ever-growing list of resources for data-driven vulnerability assessment and prioritization

License

Notifications You must be signed in to change notification settings

lhmtriet/awesome-vulnerability-assessment

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Awesome Security Vulnerability Assessment

An ever-growing list of resources for data-driven vulnerability assessment and prioritization

Your contributions are always welcome. Please see the Contributing section below for more information.

This list is orginated from the survey paper, published in the ACM Computing Surveys journal: "A Survey on Data-Driven Software Vulnerability Assessment and Prioritization"

The papers are organized based on the taxonomy of tasks in the following figure:

SV Assessment and Prioritization taxonomy

Table of Contents

List of Papers

The papers are sorted by time (newest to oldest)

---------Paper included in the survey---------

Task-wise Papers

The description of each of the task can be found in the survey paper. Note: Some of the newer papers after the survey were published may not be categorized according to the task as I'm quite busy at the moment. Any contributions to help categorize the new papers are always welcome and highly appreciated.

Exploitability Prediction

Exploit Likelihood

Exploit Time

Exploit Characteristics

Impact Prediction

Confidentiality, Integrity, Availability and Scope

Custom Vulnerability Consequences

Severity Prediction

Severe vs. Non-Severe

Severity Levels

Severity Score

Type Prediction

Common Weakness Enumeration (CWE)

Custom Vulnerability Types

Miscellaneous Tasks

Vulnerability Information Retrieval

Cross-source Vulnerability Patterns

Vulnerability Fixing Effort

Vulnerability Data

Please note that not all of the following data are open-source

Vulnerability databases

  • National Vulnerability Database
  • Common Vulnerabilities and Exposures
  • Common Weakness Enumeration
  • Common Attack Pattern Enumeration and Classification
  • Common Product Enumeration
  • MITRE ATT&CK Framework
  • CVE Details
  • Snyk
  • Secunia vulnerability database
  • ICS Cert
  • Vulners
  • Software Assurance Reference Dataset (SARD)
  • Chinese Vulnerability Database

Security advisories

  • ExploitDB
  • SecurityFocus
  • AlienVault
  • Proofpoint
  • Fortinet
  • GreyNoise
  • SecurityTracker
  • Openwall
  • X-Force
  • Symantec
  • ZeroDay Initiative
  • Metasploit
  • D2 Security's Elliot
  • Contagio
  • Recorded Future
  • Avast
  • ESET
  • Trend Micro
  • Kenna Security
  • Fortiguard Labs
  • SANS Internet Storm Centre
  • Securewords CTU
  • Reversing Labs
  • Tenable
  • Skybox

Other sources

  • Twitter
  • Reddit
  • Darkweb

Contributing

Data-driven vulnerability assessment is growing very fast, so the authors of the paper cannot keep track of all the on-going research in the field. Thus, we always welcome the contributions from the community to keep this list up-to-date. Specifically, we welcome contributions in terms of new papers, new datasets and new tasks in this field. Please first refer to the contribution guidelines before making a contribution. Thank you.

In case you have any questions, please contact us via email.

Citation

If you use the materials in this repository for your research or your work, please cite the paper:

@article{le2022survey,
   author = {Le, Triet H. M. and Chen, Huaming and Babar, M. Ali},
   title = {A Survey on Data-Driven Software Vulnerability Assessment and Prioritization},
   year = {2022},
   publisher = {Association for Computing Machinery},
   address = {New York, NY, USA},
   issn = {0360-0300},
   url = {https://doi.org/10.1145/3529757},
   doi = {10.1145/3529757},
   journal = {ACM Comput. Surv.},
   month = {mar},
}