RedHat-security-VeX / README.md
huzaifas-sidhpurwala's picture
Upload dataset
9b6d11f verified
metadata
license: cc-by-4.0
task_categories:
  - feature-extraction
  - summarization
  - text-generation
pretty_name: Red Hat Security vulnerability data for Red Hat Products
dataset_info:
  features:
    - name: cve
      dtype: string
    - name: affected_component
      dtype: string
    - name: summary
      dtype: string
    - name: severity
      dtype: string
    - name: cvss_v2
      dtype: string
    - name: cvss_v3
      dtype: string
    - name: description
      dtype: string
    - name: statement
      dtype: string
    - name: release_date
      dtype: string
    - name: fixed_products
      sequence: string
    - name: known_affected_products
      sequence: string
    - name: known_not_affected_products
      sequence: string
    - name: under_investigation_products
      sequence: string
    - name: threat_categories
      sequence: string
    - name: threat_details
      sequence: string
    - name: threat_dates
      sequence: string
    - name: remediation_categories
      sequence: string
    - name: remediation_details
      sequence: string
    - name: remediation_dates
      sequence: string
  splits:
    - name: train
      num_bytes: 794488845
      num_examples: 33765
  download_size: 141979834
  dataset_size: 794488845
configs:
  - config_name: default
    data_files:
      - split: train
        path: data/train-*

Dataset Card for RedHat-security-VeX

This Dataset is extracted from publicly available Vulnerability Exploitability eXchange (VEX) files published by Red Hat.

Dataset Details

Red Hat security data is a central source of truth for Red Hat products regarding published, known vulnerabilities. This data is published in form of Vulnerability Exploitability eXchange (VEX) available at: https://security.access.redhat.com/data/csaf/v2/vex/

This Dataset is created by extracting relevant information from this data and converting into a format, which can be used by models for fine-tuning or any other methods of data augmentation like RAG.

Data is extracted and uploaded using the following script: https://github.com/sidhpurwala-huzaifa/RedHat-security-vex-parser

  • Curated by: Huzaifa Sidhpurwala [email protected]
  • License: Creative Commons Attribution 4.0 International License

Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

References

Disclaimer

This is not an official Red Hat supported repository. Rather this Dataset is created as a personal effort by Huzaifa Sidhpurwala. Red Hat in no way is responsible for the correctness or the accuracy of this data