File size: 2,108 Bytes
808e6d3
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
e605c42
 
 
 
 
 
d88de10
24c3705
d88de10
67f8f7e
d88de10
 
 
67f8f7e
d88de10
 
67f8f7e
 
 
d88de10
67f8f7e
 
d88de10
 
67f8f7e
 
d88de10
67f8f7e
 
 
d88de10
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
---
dataset_info:
  features:
  - name: title
    dtype: string
  - name: release_date
    dtype: string
  - name: vulnerabilities
    list:
    - name: cve
      dtype: string
    - name: product_status
      struct:
      - name: fixed
        sequence: string
      - name: known_affected
        sequence: string
      - name: known_not_affected
        sequence: string
      - name: under_investigation
        sequence: string
    - name: threats
      list:
      - name: category
        dtype: string
      - name: date
        dtype: string
      - name: details
        dtype: string
      - name: product_ids
        sequence: string
  splits:
  - name: train
    num_bytes: 1463943452
    num_examples: 33765
  download_size: 258180188
  dataset_size: 1463943452
configs:
- config_name: default
  data_files:
  - split: train
    path: data/train-*
license: cc-by-4.0
task_categories:
- feature-extraction
- summarization
- text-generation
pretty_name: Red Hat Security vulnerability data for Red Hat Products
---
# Dataset Card for RedHat-security-VeX

This Dataset is extracted from publicly available Vulnerability Exploitability eXchange (VEX) files published by Red Hat.



## Dataset Details


Red Hat security data is a central source of truth for Red Hat products regarding published, known vulnerabilities.
This data is published in form of Vulnerability Exploitability eXchange (VEX) available at: 
https://security.access.redhat.com/data/csaf/v2/vex/

This Dataset is created by extracting relevant information from this data and converting into a format, 
which can be used by models for fine-tuning or any other methods of data augmentation like RAG


- **Curated by:** Huzaifa Sidhpurwala <[email protected]>
- **License:** Creative Commons Attribution 4.0 International License

Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License 
(https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, 
you must provide attribution to Red Hat Inc. and provide a link to the original.