|
--- |
|
license: cc-by-4.0 |
|
task_categories: |
|
- feature-extraction |
|
- summarization |
|
- text-generation |
|
pretty_name: Red Hat Security vulnerability data for Red Hat Products |
|
dataset_info: |
|
features: |
|
- name: cve |
|
dtype: string |
|
- name: affected_component |
|
dtype: string |
|
- name: summary |
|
dtype: string |
|
- name: severity |
|
dtype: string |
|
- name: cvss_v2 |
|
dtype: string |
|
- name: cvss_v3 |
|
dtype: string |
|
- name: vulnerability_details |
|
list: |
|
- name: product_status |
|
struct: |
|
- name: fixed |
|
sequence: string |
|
- name: known_affected |
|
sequence: string |
|
- name: known_not_affected |
|
sequence: string |
|
- name: under_investigation |
|
sequence: string |
|
- name: remediations |
|
list: |
|
- name: category |
|
dtype: string |
|
- name: date |
|
dtype: string |
|
- name: details |
|
dtype: string |
|
- name: threats |
|
list: |
|
- name: category |
|
dtype: string |
|
- name: date |
|
dtype: string |
|
- name: details |
|
dtype: string |
|
- name: description |
|
dtype: string |
|
- name: statement |
|
dtype: string |
|
- name: release_date |
|
dtype: string |
|
splits: |
|
- name: train |
|
num_bytes: 794175870 |
|
num_examples: 33765 |
|
download_size: 141350049 |
|
dataset_size: 794175870 |
|
configs: |
|
- config_name: default |
|
data_files: |
|
- split: train |
|
path: data/train-* |
|
--- |
|
# Dataset Card for RedHat-security-VeX |
|
|
|
This Dataset is extracted from publicly available Vulnerability Exploitability eXchange (VEX) files published by Red Hat. |
|
|
|
|
|
|
|
## Dataset Details |
|
|
|
|
|
Red Hat security data is a central source of truth for Red Hat products regarding published, known vulnerabilities. |
|
This data is published in form of Vulnerability Exploitability eXchange (VEX) available at: |
|
https://security.access.redhat.com/data/csaf/v2/vex/ |
|
|
|
This Dataset is created by extracting relevant information from this data and converting into a format, |
|
which can be used by models for fine-tuning or any other methods of data augmentation like RAG. |
|
|
|
Data is extracted and uploaded using the following script: |
|
https://github.com/sidhpurwala-huzaifa/RedHat-security-vex-parser |
|
|
|
|
|
- **Curated by:** Huzaifa Sidhpurwala <[email protected]> |
|
- **License:** Creative Commons Attribution 4.0 International License |
|
|
|
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License |
|
(https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, |
|
you must provide attribution to Red Hat Inc. and provide a link to the original. |
|
|
|
|
|
## References |
|
- https://www.redhat.com/en/blog/future-red-hat-security-data |
|
- https://www.redhat.com/en/blog/vulnerability-exploitability-exchange-vex-beta-files-now-available |
|
|
|
## Disclaimer |
|
This is not an official Red Hat supported repository. Rather this Dataset is created as a personal effort |
|
by Huzaifa Sidhpurwala. Red Hat in no way is responsible for the correctness or the accuracy of this data |
|
|