RedHat-security-VeX / README.md
huzaifas-sidhpurwala's picture
update script used to parse the data
80f09e5 verified
|
raw
history blame
2.24 kB
---
dataset_info:
features:
- name: title
dtype: string
- name: release_date
dtype: string
- name: vulnerabilities
list:
- name: cve
dtype: string
- name: product_status
struct:
- name: fixed
sequence: string
- name: known_affected
sequence: string
- name: known_not_affected
sequence: string
- name: under_investigation
sequence: string
- name: threats
list:
- name: category
dtype: string
- name: date
dtype: string
- name: details
dtype: string
- name: product_ids
sequence: string
splits:
- name: train
num_bytes: 1463943452
num_examples: 33765
download_size: 258180188
dataset_size: 1463943452
configs:
- config_name: default
data_files:
- split: train
path: data/train-*
license: cc-by-4.0
task_categories:
- feature-extraction
- summarization
- text-generation
pretty_name: Red Hat Security vulnerability data for Red Hat Products
---
# Dataset Card for RedHat-security-VeX
This Dataset is extracted from publicly available Vulnerability Exploitability eXchange (VEX) files published by Red Hat.
## Dataset Details
Red Hat security data is a central source of truth for Red Hat products regarding published, known vulnerabilities.
This data is published in form of Vulnerability Exploitability eXchange (VEX) available at:
https://security.access.redhat.com/data/csaf/v2/vex/
This Dataset is created by extracting relevant information from this data and converting into a format,
which can be used by models for fine-tuning or any other methods of data augmentation like RAG.
Data is extracted and uploaded using the following script:
https://github.com/sidhpurwala-huzaifa/RedHat-security-vex-parser
- **Curated by:** Huzaifa Sidhpurwala <[email protected]>
- **License:** Creative Commons Attribution 4.0 International License
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License
(https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it,
you must provide attribution to Red Hat Inc. and provide a link to the original.