Datasets:
File size: 2,877 Bytes
808e6d3 f02e851 808e6d3 5f79a00 a14b69f 5f79a00 808e6d3 5f79a00 808e6d3 d147cfb 3858742 3a987a6 1f1e2e6 a83ee37 6270a62 5f79a00 8725a57 808e6d3 676d38d 808e6d3 9b6d11f 676d38d 808e6d3 d88de10 24c3705 d88de10 67f8f7e d88de10 67f8f7e d88de10 67f8f7e d88de10 67f8f7e 80f09e5 d88de10 67f8f7e d88de10 67f8f7e d88de10 5d88f18 02e7a0f 62bfb71 |
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 |
---
license: cc-by-4.0
task_categories:
- feature-extraction
- summarization
- text-generation
pretty_name: Red Hat Security vulnerability data for Red Hat Products
dataset_info:
features:
- name: cve
dtype: string
- name: affected_component
dtype: string
- name: summary
dtype: string
- name: severity
dtype: string
- name: cvss_v2
dtype: string
- name: cvss_v3
dtype: string
- name: description
dtype: string
- name: statement
dtype: string
- name: release_date
dtype: string
- name: fixed_products
sequence: string
- name: known_affected_products
sequence: string
- name: known_not_affected_products
sequence: string
- name: under_investigation_products
sequence: string
- name: threat_categories
sequence: string
- name: threat_details
sequence: string
- name: threat_dates
sequence: string
- name: remediation_categories
sequence: string
- name: remediation_details
sequence: string
- name: remediation_dates
sequence: string
splits:
- name: train
num_bytes: 794488845
num_examples: 33765
download_size: 141979834
dataset_size: 794488845
configs:
- config_name: default
data_files:
- split: train
path: data/train-*
---
# Dataset Card for RedHat-security-VeX
This Dataset is extracted from publicly available Vulnerability Exploitability eXchange (VEX) files published by Red Hat.
## Dataset Details
Red Hat security data is a central source of truth for Red Hat products regarding published, known vulnerabilities.
This data is published in form of Vulnerability Exploitability eXchange (VEX) available at:
https://security.access.redhat.com/data/csaf/v2/vex/
This Dataset is created by extracting relevant information from this data and converting into a format,
which can be used by models for fine-tuning or any other methods of data augmentation like RAG.
Data is extracted and uploaded using the following script:
https://github.com/sidhpurwala-huzaifa/RedHat-security-vex-parser
- **Curated by:** Huzaifa Sidhpurwala <[email protected]>
- **License:** Creative Commons Attribution 4.0 International License
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License
(https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it,
you must provide attribution to Red Hat Inc. and provide a link to the original.
## References
- https://www.redhat.com/en/blog/future-red-hat-security-data
- https://www.redhat.com/en/blog/vulnerability-exploitability-exchange-vex-beta-files-now-available
## Disclaimer
This is not an official Red Hat supported repository. Rather this Dataset is created as a personal effort
by Huzaifa Sidhpurwala. Red Hat in no way is responsible for the correctness or the accuracy of this data
|