Reference

Data sources

Complete list of data sources used by Grype for vulnerability scanning

The following are a list of data sources used to directly match packages to vulnerabilities in Grype:

Data SourceVunnel ProviderEcosystems
AlmaLinux OSV DatabasealmaRPM
Alpine SecDBalpineAPK
Amazon Linux Security CenteramazonRPM
Microsoft AzureLinux OVALmarinerRPM
Bitnami Vulnerability DatabasebitnamiBitnami
Chainguard SecuritychainguardAPK
Chainguard Libraries (OpenVEX)chainguard_libraries
Debian Security TrackerdebianDPKG
ECHO SecurityechoDPKG
GitHub Security Advisoriesgithub.NET, GitHub Actions, Go, Java, JavaScript, Python, Ruby, Rust
Microsoft CBL-Mariner OVALmarinerRPM
MINIMOS SecurityminimosAPK
National Vulnerability Database (NVD)nvd.NET, APK, Go, Java, JavaScript, Python, Ruby, Rust
Oracle Linux SecurityoracleRPM
Red Hat Security Data APIrhelRPM
SUSE Security OVALslesRPM
Ubuntu CVE TrackerubuntuDPKG
Wolfi SecuritywolfiAPK

Capabilities

Here are the capabilities of each data source as Grype uses them:

Data SourceAdvisoriesDisclosuresFixesTrack by
Source
Package
AffectedDateVersionsDate
AlmaLinux OSV DatabaseALSA
Alpine SecDB
Amazon Linux Security CenterALAS
Microsoft AzureLinux OVAL
Bitnami Vulnerability Database
Chainguard SecurityCGA
Chainguard Libraries (OpenVEX)CGA
Debian Security TrackerDSA
ECHO SecurityECHO
GitHub Security AdvisoriesGHSA
Microsoft CBL-Mariner OVAL
MINIMOS Security
National Vulnerability Database (NVD)CVE
Oracle Linux SecurityELSA
Red Hat Security Data APIRHSA
SUSE Security OVALSUSE-SU
Ubuntu CVE TrackerUSN
Wolfi SecurityCGA

Auxiliary data

We additionally have auxiliary data sources that are used to enhance vulnerability matching in Grype:

Data SourceVunnel ProviderDescription
Exploit Prediction Scoring SystemepssData-driven effort by FIRST to predict the likelihood that a software vulnerability will be exploited. Provides daily-updated probability scores (0-1) and percentile rankings for CVE prioritization.
CISA Known Exploited VulnerabilitieskevCISA's authoritative catalog of vulnerabilities known to be actively exploited in the wild. Provides exploitation status, required remediation actions, due dates, and ransomware campaign associations.

These sources are cross-cutting in nature and are not tied to a specific distribution or ecosystem (though, primarily enriching information about CVEs specifically).

Last modified November 26, 2025: allow local too invocation (d20d613)