---
license: cc-by-4.0
task_categories:
- feature-extraction
- summarization
- text-generation
pretty_name: Red Hat Security vulnerability data for Red Hat Products
dataset_info:
  features:
  - name: title
    dtype: string
  - name: release_date
    dtype: string
  - name: severity
    dtype: string
  - name: cve_ids
    sequence: string
  - name: vulnerability_details
    list:
    - name: product_status
      struct:
      - name: fixed
        sequence: string
      - name: known_affected
        sequence: string
      - name: known_not_affected
        sequence: string
      - name: under_investigation
        sequence: string
    - name: threats
      list:
      - name: category
        dtype: string
      - name: date
        dtype: string
      - name: details
        dtype: string
      - name: product_ids
        sequence: string
  splits:
  - name: train
    num_bytes: 1464443957
    num_examples: 33765
  download_size: 258207020
  dataset_size: 1464443957
configs:
- config_name: default
  data_files:
  - split: train
    path: data/train-*
---
# Dataset Card for RedHat-security-VeX

This Dataset is extracted from publicly available Vulnerability Exploitability eXchange (VEX) files published by Red Hat.



## Dataset Details


Red Hat security data is a central source of truth for Red Hat products regarding published, known vulnerabilities.
This data is published in form of Vulnerability Exploitability eXchange (VEX) available at: 
https://security.access.redhat.com/data/csaf/v2/vex/

This Dataset is created by extracting relevant information from this data and converting into a format, 
which can be used by models for fine-tuning or any other methods of data augmentation like RAG.

Data is extracted and uploaded using the following script:
https://github.com/sidhpurwala-huzaifa/RedHat-security-vex-parser


- **Curated by:** Huzaifa Sidhpurwala <huzaifas@redhat.com>
- **License:** Creative Commons Attribution 4.0 International License

Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License 
(https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, 
you must provide attribution to Red Hat Inc. and provide a link to the original.


## References
- https://www.redhat.com/en/blog/future-red-hat-security-data
- https://www.redhat.com/en/blog/vulnerability-exploitability-exchange-vex-beta-files-now-available