--- dataset_info: features: - name: id dtype: string - name: title dtype: string - name: description dtype: string - name: cpes sequence: string - name: cvss_v4_0 dtype: float64 - name: cvss_v3_1 dtype: float64 - name: cvss_v3_0 dtype: float64 - name: cvss_v2_0 dtype: float64 splits: - name: train num_bytes: 346193583.5971816 num_examples: 530151 - name: test num_bytes: 38466171.402818404 num_examples: 58906 download_size: 149029861 dataset_size: 384659755.0 configs: - config_name: default data_files: - split: train path: data/train-* - split: test path: data/test-* --- ### Sources of the data - CVE Program (enriched with data from vulnrichment and Fraunhofer FKIE) - GitHub Security Advisories - PySec advisories - CSAF Red Hat - CSAF Cisco - CSAF CISA Extracted from the database of [Vulnerability-Lookup](https://vulnerability.circl.lu). Dumps of the data are available [here](https://vulnerability.circl.lu/dumps/). ### Query with datasets ```python import json from datasets import load_dataset dataset = load_dataset("CIRCL/vulnerability-scores") vulnerabilities = ["CVE-2012-2339", "RHSA-2023:5964", "GHSA-7chm-34j8-4f22", "PYSEC-2024-225"] filtered_entries = dataset.filter(lambda elem: elem["id"] in vulnerabilities) for entry in filtered_entries["train"]: print(json.dumps(entry, indent=4)) ```