Datasets:
dataset_info:
features:
- name: title
dtype: string
- name: release_date
dtype: string
- name: vulnerabilities
list:
- name: cve
dtype: string
- name: product_status
struct:
- name: fixed
sequence: string
- name: known_affected
sequence: string
- name: known_not_affected
sequence: string
- name: under_investigation
sequence: string
- name: threats
list:
- name: category
dtype: string
- name: date
dtype: string
- name: details
dtype: string
- name: product_ids
sequence: string
splits:
- name: train
num_bytes: 1463943452
num_examples: 33765
download_size: 258180188
dataset_size: 1463943452
configs:
- config_name: default
data_files:
- split: train
path: data/train-*
license: cc-by-4.0
task_categories:
- feature-extraction
- summarization
- text-generation
pretty_name: Red Hat Security vulnerability data for Red Hat Products
Dataset Card for Dataset Name
This Dataset is extracted from publicly available Vulnerability Exploitability eXchange (VEX) files published by Red Hat.
Dataset Details
Red Hat security data is a central source of truth for Red Hat products regarding published, known vulnerabilities. This data is published in form of Vulnerability Exploitability eXchange (VEX) available at: https://security.access.redhat.com/data/csaf/v2/vex/
This Dataset is created by extracting relevant information from this data and converting into a format, which can be used by models for fine-tuning or any other methods of data augmentation like RAG
- Curated by: Huzaifa Sidhpurwala [email protected]
- License: Creative Commons Attribution 4.0 International License
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.