SBOM Based AI CVE(s) Scanners

  1. Given an SBOM, the tool should be able to iterate/use various CVE(s) database and shall report any vulnerability present in the SW . The tool should eliminate the duplicates.
  2. The User shall provide various CVE(s) database URL as RAG input.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top