Security Resources

VULNERABILITY DATABASES

Essential resources for tracking security vulnerabilities across AI systems, web applications, APIs, and software supply chains.

AI/ML Security

OWASP Top 10 for LLMs

Visit Database

The definitive list of the most critical security risks for Large Language Model applications, maintained by OWASP.

Key Features:

  • Covers prompt injection, data poisoning, and model theft
  • Updated annually with emerging threats
  • Industry-standard for LLM security assessments
  • Includes remediation guidance

When to Use:

The foundation for any LLM security assessment. Required knowledge for vendors building or buyers evaluating AI products.

Explore OWASP

MITRE ATLAS

Visit Database

Adversarial Threat Landscape for AI Systems. A knowledge base of adversary tactics and techniques based on real-world attack observations.

Key Features:

  • Maps AI attack techniques to the ATT&CK framework
  • Documents real-world AI attack case studies
  • Provides defensive recommendations
  • Covers the full AI/ML lifecycle

When to Use:

Understand how attackers target AI systems in practice. Critical for threat modeling AI deployments.

Explore MITRE

MIT AI Risk Repository

Visit Database

A comprehensive database of 1,600+ AI risks extracted from 74 frameworks. Includes causal and domain taxonomies for classifying AI risks.

Key Features:

  • 1,600+ risks with source citations and evidence
  • Causal taxonomy (entity, intentionality, timing)
  • 7 risk domains including safety, privacy, misuse
  • Updated regularly with new frameworks

When to Use:

Comprehensive risk identification for AI governance. Useful for policy development and risk assessments.

Explore MIT

NIST AI RMF

Visit Database

The NIST AI Risk Management Framework provides guidance for managing AI risks. Updated in 2025 for generative AI.

Key Features:

  • Voluntary framework for AI risk management
  • Generative AI profile (NIST-AI-600-1)
  • Aligns with cybersecurity frameworks
  • Covers bias, explainability, and model vulnerabilities

When to Use:

Framework for AI governance and risk management. Required reference for enterprise AI deployments.

Explore NIST

AI Incident Database

Visit Database

A comprehensive database cataloging real-world AI failures, harms, and near-misses. Maintained by the Responsible AI Collaborative with over 3,000 incident reports.

Key Features:

  • Documents real-world AI harms and failures
  • Searchable taxonomy of AI incident types
  • Public GraphQL API for data access
  • Community-contributed and peer-reviewed reports

When to Use:

Learn from past AI failures to prevent future incidents. Essential for AI risk assessments and due diligence.

Explore AI

General Security

NIST NVD (National Vulnerability Database)

Visit Database

The U.S. government repository of standards-based vulnerability data using CVE identifiers. The authoritative source for software vulnerabilities.

Key Features:

  • Contains 200,000+ CVE entries
  • CVSS scoring for severity assessment
  • Integration with security tools and scanners
  • Includes vendor advisories and patches

When to Use:

Check for known vulnerabilities in software dependencies, frameworks, and infrastructure components.

Explore NIST

ENISA EUVD (European Vulnerability Database)

Visit Database

The EU's vulnerability database mandated by NIS2 Directive. Provides a European alternative to US-centric vulnerability sources with its own EUVD identifiers.

Key Features:

  • EU-coordinated vulnerability disclosures
  • Aggregates data from European CSIRTs
  • Dashboards for critical and exploited vulns
  • Parallel system to CVE with EUVD identifiers

When to Use:

Essential for EU-based organizations and NIS2 compliance. Provides European perspective on vulnerabilities.

Explore ENISA

Web Security

OWASP Top 10 for Web Applications

Visit Database

The standard awareness document for web application security. Represents broad consensus on the most critical security risks to web applications.

Key Features:

  • Updated every 3-4 years based on data analysis
  • Covers injection, broken access control, cryptographic failures
  • Industry-standard for web security assessments
  • Extensive documentation and remediation guides

When to Use:

Foundational checklist for any web application security assessment. Required for compliance frameworks.

Explore OWASP

API Security

OWASP Top 10 for APIs

Visit Database

Security risks specific to APIs, addressing the unique challenges of API-first architectures and microservices.

Key Features:

  • Covers BOLA, broken authentication, excessive data exposure
  • API-specific attack patterns
  • REST, GraphQL, and gRPC considerations
  • Updated for modern API architectures

When to Use:

Essential for assessing API security in SaaS products, mobile backends, and microservices architectures.

Explore OWASP

Software Security

CWE (Common Weakness Enumeration)

Visit Database

A community-developed list of software and hardware weakness types. Serves as a common language for describing security weaknesses.

Key Features:

  • 900+ weakness types catalogued
  • Hierarchical organization of weaknesses
  • Maps to CVEs and other databases
  • Used by static analysis tools

When to Use:

Understand the root causes of vulnerabilities. Useful for secure code review and developer training.

Explore CWE

Threat Intelligence

MITRE ATT&CK

Visit Database

A globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.

Key Features:

  • Covers enterprise, mobile, and ICS environments
  • Documents adversary groups and their techniques
  • Provides detection and mitigation guidance
  • Industry standard for threat modeling

When to Use:

Map security controls to known attack techniques. Essential for building detection and response capabilities.

Explore MITRE

Supply Chain Security

GitHub Advisory Database

Visit Database

A database of CVEs and GitHub-originated security advisories affecting open source software.

Key Features:

  • Covers npm, pip, RubyGems, and more
  • Integrates with Dependabot alerts
  • Community-contributed advisories
  • Machine-readable format (OSV)

When to Use:

Monitor open source dependencies for known vulnerabilities. Critical for software supply chain security.

Explore GitHub

NEED HELP ASSESSING VULNERABILITIES?

Our security experts can help you understand how these databases apply to your AI systems and vendor assessments.