vulnerability-db
vulnerability-db copied to clipboard
purl to cpe generalizer
Initially, could be a contrib script. Based on the cve, we can first identify the namespace and name aliases. Then we can attempt to come up with a generalizer algorithm to attempt to generate the variations for a given purl.