huzaifas-sidhpurwala commited on
Commit
67f8f7e
1 Parent(s): d88de10
Files changed (1) hide show
  1. README.md +12 -124
README.md CHANGED
@@ -49,138 +49,26 @@ pretty_name: Red Hat Security vulnerability data for Red Hat Products
49
  ---
50
  # Dataset Card for Dataset Name
51
 
52
- <!-- Provide a quick summary of the dataset. -->
53
 
54
- This dataset card aims to be a base template for new datasets. It has been generated using [this raw template](https://github.com/huggingface/huggingface_hub/blob/main/src/huggingface_hub/templates/datasetcard_template.md?plain=1).
55
 
56
- ## Dataset Details
57
-
58
- ### Dataset Description
59
-
60
- <!-- Provide a longer summary of what this dataset is. -->
61
-
62
-
63
-
64
- - **Curated by:** [More Information Needed]
65
- - **Funded by [optional]:** [More Information Needed]
66
- - **Shared by [optional]:** [More Information Needed]
67
- - **Language(s) (NLP):** [More Information Needed]
68
- - **License:** [More Information Needed]
69
-
70
- ### Dataset Sources [optional]
71
-
72
- <!-- Provide the basic links for the dataset. -->
73
-
74
- - **Repository:** [More Information Needed]
75
- - **Paper [optional]:** [More Information Needed]
76
- - **Demo [optional]:** [More Information Needed]
77
-
78
- ## Uses
79
-
80
- <!-- Address questions around how the dataset is intended to be used. -->
81
-
82
- ### Direct Use
83
-
84
- <!-- This section describes suitable use cases for the dataset. -->
85
-
86
- [More Information Needed]
87
-
88
- ### Out-of-Scope Use
89
-
90
- <!-- This section addresses misuse, malicious use, and uses that the dataset will not work well for. -->
91
-
92
- [More Information Needed]
93
-
94
- ## Dataset Structure
95
-
96
- <!-- This section provides a description of the dataset fields, and additional information about the dataset structure such as criteria used to create the splits, relationships between data points, etc. -->
97
-
98
- [More Information Needed]
99
-
100
- ## Dataset Creation
101
-
102
- ### Curation Rationale
103
-
104
- <!-- Motivation for the creation of this dataset. -->
105
-
106
- [More Information Needed]
107
-
108
- ### Source Data
109
-
110
- <!-- This section describes the source data (e.g. news text and headlines, social media posts, translated sentences, ...). -->
111
-
112
- #### Data Collection and Processing
113
-
114
- <!-- This section describes the data collection and processing process such as data selection criteria, filtering and normalization methods, tools and libraries used, etc. -->
115
 
116
- [More Information Needed]
117
-
118
- #### Who are the source data producers?
119
-
120
- <!-- This section describes the people or systems who originally created the data. It should also include self-reported demographic or identity information for the source data creators if this information is available. -->
121
-
122
- [More Information Needed]
123
-
124
- ### Annotations [optional]
125
-
126
- <!-- If the dataset contains annotations which are not part of the initial data collection, use this section to describe them. -->
127
-
128
- #### Annotation process
129
-
130
- <!-- This section describes the annotation process such as annotation tools used in the process, the amount of data annotated, annotation guidelines provided to the annotators, interannotator statistics, annotation validation, etc. -->
131
-
132
- [More Information Needed]
133
-
134
- #### Who are the annotators?
135
-
136
- <!-- This section describes the people or systems who created the annotations. -->
137
-
138
- [More Information Needed]
139
-
140
- #### Personal and Sensitive Information
141
-
142
- <!-- State whether the dataset contains data that might be considered personal, sensitive, or private (e.g., data that reveals addresses, uniquely identifiable names or aliases, racial or ethnic origins, sexual orientations, religious beliefs, political opinions, financial or health data, etc.). If efforts were made to anonymize the data, describe the anonymization process. -->
143
-
144
- [More Information Needed]
145
-
146
- ## Bias, Risks, and Limitations
147
-
148
- <!-- This section is meant to convey both technical and sociotechnical limitations. -->
149
-
150
- [More Information Needed]
151
-
152
- ### Recommendations
153
-
154
- <!-- This section is meant to convey recommendations with respect to the bias, risk, and technical limitations. -->
155
-
156
- Users should be made aware of the risks, biases and limitations of the dataset. More information needed for further recommendations.
157
-
158
- ## Citation [optional]
159
-
160
- <!-- If there is a paper or blog post introducing the dataset, the APA and Bibtex information for that should go in this section. -->
161
-
162
- **BibTeX:**
163
-
164
- [More Information Needed]
165
-
166
- **APA:**
167
-
168
- [More Information Needed]
169
-
170
- ## Glossary [optional]
171
 
172
- <!-- If relevant, include terms and calculations in this section that can help readers understand the dataset or dataset card. -->
173
 
174
- [More Information Needed]
 
 
175
 
176
- ## More Information [optional]
 
177
 
178
- [More Information Needed]
179
 
180
- ## Dataset Card Authors [optional]
 
181
 
182
- [More Information Needed]
 
 
183
 
184
- ## Dataset Card Contact
185
 
186
- [More Information Needed]
 
49
  ---
50
  # Dataset Card for Dataset Name
51
 
52
+ This Dataset is extracted from publicly available Vulnerability Exploitability eXchange (VEX) files published by Red Hat.
53
 
 
54
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
55
 
56
+ ## Dataset Details
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
57
 
 
58
 
59
+ Red Hat security data is a central source of truth for Red Hat products regarding published, known vulnerabilities.
60
+ This data is published in form of Vulnerability Exploitability eXchange (VEX) available at:
61
+ https://security.access.redhat.com/data/csaf/v2/vex/
62
 
63
+ This Dataset is created by extracting relevant information from this data and converting into a format,
64
+ which can be used by models for fine-tuning or any other methods of data augmentation like RAG
65
 
 
66
 
67
+ - **Curated by:** Huzaifa Sidhpurwala <[email protected]>
68
+ - **License:** Creative Commons Attribution 4.0 International License
69
 
70
+ Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License
71
+ (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it,
72
+ you must provide attribution to Red Hat Inc. and provide a link to the original.
73
 
 
74