FOSSA logo
Platform
FOSSA Platform
The Modern Open Source Risk Management Platform
FOSSA Platform
Product
Vulnerability Management
License Compliance
Solutions
SBOM Management
Continuous Compliance
Due Diligence
Shift Code Security Left
Generative AI Risk Management
Resources
Getting Started with FOSSA
Documentation
Blog
Resource Library
Events
tl;drLegal
Company
About FOSSA
Customers
Careers
Partners
Press
Contact Us
For Developers
Pricing
Log In
|
Start for Free
Schedule Demo
Log In
|
Sign Up
|
  • Vulnerability Management
  • License Compliance
  • Open Source in the News
  • Software Composition Analysis
  • Developers

Open Source Vulnerability Management

A collection of 37 posts

Imagery that depicts characteristics of a medical device
Open Source Vulnerability Management

Complying with the FDA’s SBOM Requirements

The FDA now requires medical device manufacturers to submit an SBOM (software bill of materials) as part of the premarket review process.

  • Cortez Frazier Jr.
    Cortez Frazier Jr.
6 min read
Enable Global Visibility and Swift Remediation with Package Index
Inside FOSSA

Enable Global Visibility and Swift Remediation with Package Index

Package Index offers comprehensive visibility into your software supply main, making it much easier to find a specific package or vulnerability.

  • Christian Capdeville
    Christian Capdeville
3 min read
4 Takeaways from the ESF’s OSS and SBOM Management Recommendations
Open Source in the News

4 Takeaways from the ESF’s OSS and SBOM Management Recommendations

A new publication from the Enduring Security Framework (ESF) working group includes recommendations to help organizations manage SBOMs and OSS-related risks.

  • Cortez Frazier Jr.
    Cortez Frazier Jr.
5 min read
Reduce Alert Fatigue with FOSSA’s Auto-Ignore Rules
Inside FOSSA

Reduce Alert Fatigue with FOSSA’s Auto-Ignore Rules

Explore the recently launched auto-ignore feature, which streamlines issue resolution across multiple projects and package versions

  • Christian Capdeville
    Christian Capdeville
3 min read
Terrapin (CVE-2023-48795): New Attack Impacts the SSH Protocol
Open Source Vulnerability Management

Terrapin (CVE-2023-48795): New Attack Impacts the SSH Protocol

The recently announced Terrapin attack (CVE-2023-48795) impacts the popular SSH protocol. Here’s what you need to know about the vulnerability.

  • Cortez Frazier Jr.
    Cortez Frazier Jr.
3 min read
Understanding and Using the EPSS Scoring System
Open Source Vulnerability Management

Understanding and Using the EPSS Scoring System

EPSS (Exploit Prediction Scoring System) measures how likely a vulnerability is to be exploited in the wild.

  • Cortez Frazier Jr.
    Cortez Frazier Jr.
4 min read
Best Practices for Generating High-Quality SBOMs
Open Source Vulnerability Management

Best Practices for Generating High-Quality SBOMs

The more accurate and comprehensive an SBOM is, the more valuable it will be. See considerations and strategies for generating high-quality SBOMs in your organization.

  • Cortez Frazier Jr.
    Cortez Frazier Jr.
7 min read
Curl Vulnerabilities: Impact and Fixes (Curl 8.4.0)
Open Source Vulnerability Management

Curl Vulnerabilities: Impact and Fixes (Curl 8.4.0)

New vulnerabilities impacting the popular Curl command line tool and library were disclosed on Oct. 11. See details and fixes.

  • Sara Beaudet
3 min read
SBOM Examples, Explained
Software Composition Analysis

SBOM Examples, Explained

See two SBOM examples, including practical explanations for data fields and document sections.

  • Cortez Frazier Jr.
    Cortez Frazier Jr.
7 min read
Understanding and Using SPDX License Identifiers and License Expressions
Software Composition Analysis

Understanding and Using SPDX License Identifiers and License Expressions

Learn about SPDX License Identifiers and License Expressions, and see how you can use them to communicate licensing information in an SBOM.

  • Cortez Frazier Jr.
    Cortez Frazier Jr.
5 min read
5 Ways SBOM Can Strengthen Security
Open Source Vulnerability Management

5 Ways SBOM Can Strengthen Security

See five ways SBOMs can improve security, including enhanced visibility into vulnerabilities and support for remediation.

  • Cortez Frazier Jr.
    Cortez Frazier Jr.
5 min read
Vulnerability Remediation Tactics
Open Source Vulnerability Management

Vulnerability Remediation Tactics

Explore strategies for remediating vulnerabilities in third-party software components, including pros and cons for each.

  • Eliza Zhang
    Eliza Zhang
8 min read
VEX (Vulnerability Exploitability eXchange): Purpose and Use Cases
Open Source Vulnerability Management

VEX (Vulnerability Exploitability eXchange): Purpose and Use Cases

Learn about VEX (Vulnerability Exploitability eXchange), which is used to communicate whether vulnerabilities impacting software products are actually exploitable.

  • Tom Alrich
    Tom Alrich
10 min read
How to Operationalize SBOMs Throughout the SDLC
Open Source Vulnerability Management

How to Operationalize SBOMs Throughout the SDLC

Explore best practices for getting value from software bill of materials (SBOM) data throughout the software development lifecycle.

  • Kenaz Kwa
    Kenaz Kwa
4 min read
OpenSSL Vulnerability 2022: Details and Fixes
Open Source Vulnerability Management

OpenSSL Vulnerability 2022: Details and Fixes

Two new high-severity vulnerabilities impacting OpenSSL have been disclosed. Here's what we know about the issues and how to address them.

  • FOSSA Editorial Team
    FOSSA Editorial Team
3 min read
CVE-2022-42889 Text4Shell Vulnerability: Impact and Fixes
Open Source in the News

CVE-2022-42889 Text4Shell Vulnerability: Impact and Fixes

See important details on the Text4Shell vulnerability, including affected versions, how it compares to Log4Shell, and how to identify and remediate it.

  • FOSSA Editorial Team
    FOSSA Editorial Team
3 min read
Analyzing the Securing Open Source Software Act
Open Source in the News

Analyzing the Securing Open Source Software Act

A new piece of proposed legislation would direct the U.S. federal government to create a framework for assessing security risks in open source software.

  • FOSSA Editorial Team
    FOSSA Editorial Team
4 min read
U.S. Government Memo Requires Self-Attestation to Secure Development Practices
Open Source Vulnerability Management

U.S. Government Memo Requires Self-Attestation to Secure Development Practices

U.S. government agencies must now require software suppliers to self-attest that they have adhered to NIST Guidance for secure software development.

  • FOSSA Editorial Team
    FOSSA Editorial Team
5 min read
A Practical Guide to the SLSA Framework
Open Source Vulnerability Management

A Practical Guide to the SLSA Framework

SLSA is a Google-created framework designed to help organizations improve the integrity of their software supply chains.

  • John Speed Meyers (Chainguard) and Andy Drukarev (FOSSA)
    John Speed Meyers (Chainguard) and Andy Drukarev (FOSSA)
7 min read
How to Implement the CSRB’s Log4j Security Recommendations
Open Source Vulnerability Management

How to Implement the CSRB’s Log4j Security Recommendations

See guidance for implementing the security recommendations in the CSRB's recent report on the Log4j vulnerability.

  • FOSSA Editorial Team
    FOSSA Editorial Team
7 min read
Announcing the Private Beta of FOSSA Risk Intelligence
Inside FOSSA

Announcing the Private Beta of FOSSA Risk Intelligence

We're excited to announce the private beta of FOSSA Risk Intelligence, which will help users harden their software supply chains.

  • Gauthami Polasani
    Gauthami Polasani
2 min read
Understanding and Preventing Dependency Confusion Attacks
Open Source Vulnerability Management

Understanding and Preventing Dependency Confusion Attacks

Dependency confusion exploits rely on a quirk in certain package managers. See how these attacks can happen, and get guidance on preventing them.

  • FOSSA Editorial Team
    FOSSA Editorial Team
4 min read
An Overview of Spring RCE Vulnerabilities
Open Source Vulnerability Management

An Overview of Spring RCE Vulnerabilities

A pair of critical remote code execution vulnerabilities impacting Spring were disclosed this week.

  • FOSSA Editorial Team
    FOSSA Editorial Team
3 min read
The Three Pillars of Reproducible Builds
Developer Perspectives

The Three Pillars of Reproducible Builds

Explore three key principles of designing reproducible builds: repeatable builds, immutable environments, and source availability.

  • Jessica Black
    Jessica Black
7 min read
5 Highlights from the U.S. Senate’s Log4J Vulnerability Hearing
Open Source in the News

5 Highlights from the U.S. Senate’s Log4J Vulnerability Hearing

The U.S. Senate's hearing on Log4Shell brought to light new information on the Log4J vulnerability and industry's response to it.

  • FOSSA Editorial Team
    FOSSA Editorial Team
7 min read
  • For the Love of Open Source © 2024 FOSSA, Inc.
  • Privacy Policy
  • Terms & Conditions