Datasets:
license: cc-by-4.0
task_categories:
- feature-extraction
- summarization
- text-generation
pretty_name: Red Hat Security vulnerability data for Red Hat Products
dataset_info:
features:
- name: cve
dtype: string
- name: affected_component
dtype: string
- name: summary
dtype: string
- name: severity
dtype: string
- name: cvss_v2
dtype: string
- name: cvss_v3
dtype: string
- name: description
dtype: string
- name: statement
dtype: string
- name: release_date
dtype: string
- name: fixed_products
sequence: string
- name: known_affected_products
sequence: string
- name: known_not_affected_products
sequence: string
- name: under_investigation_products
sequence: string
- name: threat_categories
sequence: string
- name: threat_details
sequence: string
- name: threat_dates
sequence: string
- name: remediation_categories
sequence: string
- name: remediation_details
sequence: string
- name: remediation_dates
sequence: string
splits:
- name: train
num_bytes: 794488845
num_examples: 33765
download_size: 141979834
dataset_size: 794488845
configs:
- config_name: default
data_files:
- split: train
path: data/train-*
Dataset Card for RedHat-security-VeX
This Dataset is extracted from publicly available Vulnerability Exploitability eXchange (VEX) files published by Red Hat.
Dataset Details
Red Hat security data is a central source of truth for Red Hat products regarding published, known vulnerabilities. This data is published in form of Vulnerability Exploitability eXchange (VEX) available at: https://security.access.redhat.com/data/csaf/v2/vex/
This Dataset is created by extracting relevant information from this data and converting into a format, which can be used by models for fine-tuning or any other methods of data augmentation like RAG.
Data is extracted and uploaded using the following script: https://github.com/sidhpurwala-huzaifa/RedHat-security-vex-parser
- Curated by: Huzaifa Sidhpurwala [email protected]
- License: Creative Commons Attribution 4.0 International License
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
References
- https://www.redhat.com/en/blog/future-red-hat-security-data
- https://www.redhat.com/en/blog/vulnerability-exploitability-exchange-vex-beta-files-now-available
Disclaimer
This is not an official Red Hat supported repository. Rather this Dataset is created as a personal effort by Huzaifa Sidhpurwala. Red Hat in no way is responsible for the correctness or the accuracy of this data