Datasets:
The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
Error code: DatasetGenerationError Exception: ArrowInvalid Message: JSON parse error: Column(/messages/[]/content) changed from string to array in row 2 Traceback: Traceback (most recent call last): File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/packaged_modules/json/json.py", line 160, in _generate_tables df = pandas_read_json(f) File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/packaged_modules/json/json.py", line 38, in pandas_read_json return pd.read_json(path_or_buf, **kwargs) File "/src/services/worker/.venv/lib/python3.9/site-packages/pandas/io/json/_json.py", line 815, in read_json return json_reader.read() File "/src/services/worker/.venv/lib/python3.9/site-packages/pandas/io/json/_json.py", line 1025, in read obj = self._get_object_parser(self.data) File "/src/services/worker/.venv/lib/python3.9/site-packages/pandas/io/json/_json.py", line 1051, in _get_object_parser obj = FrameParser(json, **kwargs).parse() File "/src/services/worker/.venv/lib/python3.9/site-packages/pandas/io/json/_json.py", line 1187, in parse self._parse() File "/src/services/worker/.venv/lib/python3.9/site-packages/pandas/io/json/_json.py", line 1403, in _parse ujson_loads(json, precise_float=self.precise_float), dtype=None ValueError: Trailing data During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1854, in _prepare_split_single for _, table in generator: File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/packaged_modules/json/json.py", line 163, in _generate_tables raise e File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/packaged_modules/json/json.py", line 137, in _generate_tables pa_table = paj.read_json( File "pyarrow/_json.pyx", line 308, in pyarrow._json.read_json File "pyarrow/error.pxi", line 154, in pyarrow.lib.pyarrow_internal_check_status File "pyarrow/error.pxi", line 91, in pyarrow.lib.check_status pyarrow.lib.ArrowInvalid: JSON parse error: Column(/messages/[]/content) changed from string to array in row 2 The above exception was the direct cause of the following exception: Traceback (most recent call last): File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1417, in compute_config_parquet_and_info_response parquet_operations = convert_to_parquet(builder) File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1049, in convert_to_parquet builder.download_and_prepare( File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 924, in download_and_prepare self._download_and_prepare( File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1000, in _download_and_prepare self._prepare_split(split_generator, **prepare_split_kwargs) File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1741, in _prepare_split for job_id, done, content in self._prepare_split_single( File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1897, in _prepare_split_single raise DatasetGenerationError("An error occurred while generating the dataset") from e datasets.exceptions.DatasetGenerationError: An error occurred while generating the dataset
Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.
CVE ID
string | Human Input
string | Analyst Response
string |
---|---|---|
CVE-1999-0001 | Explain the CVE ID: What does the identifier CVE-1999-0001 mean in the context of cybersecurity? | CVE-1999-0001 |
CVE-1999-0001 | Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0001. | ip_input.c in BSD-derived TCP/IP implementations allows remote attackers to cause a denial of service (crash or hang) via crafted packets. |
CVE-1999-0001 | Provide references for further information: Can you share references or external links related to CVE-1999-0001? | {'tags': ['x_refsource_CONFIRM'], 'url': 'http://www.openbsd.org/errata23.html#tcpfix'}, {'name': '5707', 'tags': ['vdb-entry', 'x_refsource_OSVDB'], 'url': 'http://www.osvdb.org/5707'} |
CVE-1999-0001 | Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0001? | PUBLISHED |
CVE-1999-0002 | Explain the CVE ID: What does the identifier CVE-1999-0002 mean in the context of cybersecurity? | CVE-1999-0002 |
CVE-1999-0002 | Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0002. | Buffer overflow in NFS mountd gives root access to remote attackers, mostly in Linux systems. |
CVE-1999-0002 | Provide references for further information: Can you share references or external links related to CVE-1999-0002? | {'name': 'J-006', 'tags': ['third-party-advisory', 'government-resource', 'x_refsource_CIAC'], 'url': 'http://www.ciac.org/ciac/bulletins/j-006.shtml'}, {'name': '19981006-01-I', 'tags': ['vendor-advisory', 'x_refsource_SGI'], 'url': 'ftp://patches.sgi.com/support/free/security/advisories/19981006-01-I'}, {'name': '121', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/121'} |
CVE-1999-0002 | Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0002? | PUBLISHED |
CVE-1999-0003 | Explain the CVE ID: What does the identifier CVE-1999-0003 mean in the context of cybersecurity? | CVE-1999-0003 |
CVE-1999-0003 | Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0003. | Execute commands as root via buffer overflow in Tooltalk database server (rpc.ttdbserverd). |
CVE-1999-0003 | Provide references for further information: Can you share references or external links related to CVE-1999-0003? | {'name': '122', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/122'}, {'name': '19981101-01-A', 'tags': ['vendor-advisory', 'x_refsource_SGI'], 'url': 'ftp://patches.sgi.com/support/free/security/advisories/19981101-01-A'}, {'name': '19981101-01-PX', 'tags': ['vendor-advisory', 'x_refsource_SGI'], 'url': 'ftp://patches.sgi.com/support/free/security/advisories/19981101-01-PX'} |
CVE-1999-0003 | Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0003? | PUBLISHED |
CVE-1999-0004 | Explain the CVE ID: What does the identifier CVE-1999-0004 mean in the context of cybersecurity? | CVE-1999-0004 |
CVE-1999-0004 | Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0004. | MIME buffer overflow in email clients, e.g. Solaris mailtool and Outlook. |
CVE-1999-0004 | Provide references for further information: Can you share references or external links related to CVE-1999-0004? | {'name': 'MS98-008', 'tags': ['vendor-advisory', 'x_refsource_MS'], 'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-008'} |
CVE-1999-0004 | Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0004? | PUBLISHED |
CVE-1999-0005 | Explain the CVE ID: What does the identifier CVE-1999-0005 mean in the context of cybersecurity? | CVE-1999-0005 |
CVE-1999-0005 | Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0005. | Arbitrary command execution via IMAP buffer overflow in authenticate command. |
CVE-1999-0005 | Provide references for further information: Can you share references or external links related to CVE-1999-0005? | {'name': '130', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/130'}, {'name': '00177', 'tags': ['vendor-advisory', 'x_refsource_SUN'], 'url': 'http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/177'} |
CVE-1999-0005 | Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0005? | PUBLISHED |
CVE-1999-0006 | Explain the CVE ID: What does the identifier CVE-1999-0006 mean in the context of cybersecurity? | CVE-1999-0006 |
CVE-1999-0006 | Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0006. | Buffer overflow in POP servers based on BSD/Qualcomm's qpopper allows remote attackers to gain root access using a long PASS command. |
CVE-1999-0006 | Provide references for further information: Can you share references or external links related to CVE-1999-0006? | {'name': '19980801-01-I', 'tags': ['vendor-advisory', 'x_refsource_SGI'], 'url': 'ftp://patches.sgi.com/support/free/security/advisories/19980801-01-I'}, {'name': '133', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/133'} |
CVE-1999-0006 | Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0006? | PUBLISHED |
CVE-1999-0007 | Explain the CVE ID: What does the identifier CVE-1999-0007 mean in the context of cybersecurity? | CVE-1999-0007 |
CVE-1999-0007 | Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0007. | Information from SSL-encrypted sessions via PKCS #1. |
CVE-1999-0007 | Provide references for further information: Can you share references or external links related to CVE-1999-0007? | {'name': 'MS98-002', 'tags': ['vendor-advisory', 'x_refsource_MS'], 'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-002'} |
CVE-1999-0007 | Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0007? | PUBLISHED |
CVE-1999-0008 | Explain the CVE ID: What does the identifier CVE-1999-0008 mean in the context of cybersecurity? | CVE-1999-0008 |
CVE-1999-0008 | Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0008. | Buffer overflow in NIS+, in Sun's rpc.nisd program. |
CVE-1999-0008 | Provide references for further information: Can you share references or external links related to CVE-1999-0008? | {'name': '00170', 'tags': ['vendor-advisory', 'x_refsource_SUN'], 'url': 'http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/170'} |
CVE-1999-0008 | Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0008? | PUBLISHED |
CVE-1999-0009 | Explain the CVE ID: What does the identifier CVE-1999-0009 mean in the context of cybersecurity? | CVE-1999-0009 |
CVE-1999-0009 | Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0009. | Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases. |
CVE-1999-0009 | Provide references for further information: Can you share references or external links related to CVE-1999-0009? | {'name': '19980603-01-PX', 'tags': ['vendor-advisory', 'x_refsource_SGI'], 'url': 'ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX'}, {'name': '134', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/134'}, {'name': 'HPSBUX9808-083', 'tags': ['vendor-advisory', 'x_refsource_HP'], 'url': 'http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083'}, {'name': '00180', 'tags': ['vendor-advisory', 'x_refsource_SUN'], 'url': 'http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/180'} |
CVE-1999-0009 | Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0009? | PUBLISHED |
CVE-1999-0010 | Explain the CVE ID: What does the identifier CVE-1999-0010 mean in the context of cybersecurity? | CVE-1999-0010 |
CVE-1999-0010 | Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0010. | Denial of Service vulnerability in BIND 8 Releases via maliciously formatted DNS messages. |
CVE-1999-0010 | Provide references for further information: Can you share references or external links related to CVE-1999-0010? | {'name': '19980603-01-PX', 'tags': ['vendor-advisory', 'x_refsource_SGI'], 'url': 'ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX'}, {'name': 'HPSBUX9808-083', 'tags': ['vendor-advisory', 'x_refsource_HP'], 'url': 'http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083'} |
CVE-1999-0010 | Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0010? | PUBLISHED |
CVE-1999-0011 | Explain the CVE ID: What does the identifier CVE-1999-0011 mean in the context of cybersecurity? | CVE-1999-0011 |
CVE-1999-0011 | Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0011. | Denial of Service vulnerabilities in BIND 4.9 and BIND 8 Releases via CNAME record and zone transfer. |
CVE-1999-0011 | Provide references for further information: Can you share references or external links related to CVE-1999-0011? | {'name': '19980603-01-PX', 'tags': ['vendor-advisory', 'x_refsource_SGI'], 'url': 'ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX'}, {'name': 'HPSBUX9808-083', 'tags': ['vendor-advisory', 'x_refsource_HP'], 'url': 'http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083'}, {'name': '00180', 'tags': ['vendor-advisory', 'x_refsource_SUN'], 'url': 'http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/180'} |
CVE-1999-0011 | Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0011? | PUBLISHED |
CVE-1999-0012 | Explain the CVE ID: What does the identifier CVE-1999-0012 mean in the context of cybersecurity? | CVE-1999-0012 |
CVE-1999-0012 | Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0012. | Some web servers under Microsoft Windows allow remote attackers to bypass access restrictions for files with long file names. |
CVE-1999-0012 | Provide references for further information: Can you share references or external links related to CVE-1999-0012? | {'tags': ['x_refsource_MISC'], 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0012'} |
CVE-1999-0012 | Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0012? | PUBLISHED |
CVE-1999-0013 | Explain the CVE ID: What does the identifier CVE-1999-0013 mean in the context of cybersecurity? | CVE-1999-0013 |
CVE-1999-0013 | Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0013. | Stolen credentials from SSH clients via ssh-agent program, allowing other local users to access remote accounts belonging to the ssh-agent user. |
CVE-1999-0013 | Provide references for further information: Can you share references or external links related to CVE-1999-0013? | {'tags': ['x_refsource_MISC'], 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0013'} |
CVE-1999-0013 | Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0013? | PUBLISHED |
CVE-1999-0014 | Explain the CVE ID: What does the identifier CVE-1999-0014 mean in the context of cybersecurity? | CVE-1999-0014 |
CVE-1999-0014 | Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0014. | Unauthorized privileged access or denial of service via dtappgather program in CDE. |
CVE-1999-0014 | Provide references for further information: Can you share references or external links related to CVE-1999-0014? | {'name': 'HPSBUX9801-075', 'tags': ['vendor-advisory', 'x_refsource_HP'], 'url': 'http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9801-075'}, {'name': '00185', 'tags': ['vendor-advisory', 'x_refsource_SUN'], 'url': 'http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/185'} |
CVE-1999-0014 | Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0014? | PUBLISHED |
CVE-1999-0015 | Explain the CVE ID: What does the identifier CVE-1999-0015 mean in the context of cybersecurity? | CVE-1999-0015 |
CVE-1999-0015 | Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0015. | Teardrop IP denial of service. |
CVE-1999-0015 | Provide references for further information: Can you share references or external links related to CVE-1999-0015? | {'name': 'oval:org.mitre.oval:def:5579', 'tags': ['vdb-entry', 'signature', 'x_refsource_OVAL'], 'url': 'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5579'} |
CVE-1999-0015 | Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0015? | PUBLISHED |
CVE-1999-0016 | Explain the CVE ID: What does the identifier CVE-1999-0016 mean in the context of cybersecurity? | CVE-1999-0016 |
CVE-1999-0016 | Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0016. | Land IP denial of service. |
CVE-1999-0016 | Provide references for further information: Can you share references or external links related to CVE-1999-0016? | {'name': 'HPSBUX9801-076', 'tags': ['vendor-advisory', 'x_refsource_HP'], 'url': 'http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9801-076'} |
CVE-1999-0016 | Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0016? | PUBLISHED |
CVE-1999-0017 | Explain the CVE ID: What does the identifier CVE-1999-0017 mean in the context of cybersecurity? | CVE-1999-0017 |
CVE-1999-0017 | Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0017. | FTP servers can allow an attacker to connect to arbitrary ports on machines other than the FTP client, aka FTP bounce. |
CVE-1999-0017 | Provide references for further information: Can you share references or external links related to CVE-1999-0017? | {'tags': ['x_refsource_MISC'], 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0017'} |
CVE-1999-0017 | Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0017? | PUBLISHED |
CVE-1999-0018 | Explain the CVE ID: What does the identifier CVE-1999-0018 mean in the context of cybersecurity? | CVE-1999-0018 |
CVE-1999-0018 | Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0018. | Buffer overflow in statd allows root privileges. |
CVE-1999-0018 | Provide references for further information: Can you share references or external links related to CVE-1999-0018? | {'name': '127', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/127'} |
CVE-1999-0018 | Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0018? | PUBLISHED |
CVE-1999-0019 | Explain the CVE ID: What does the identifier CVE-1999-0019 mean in the context of cybersecurity? | CVE-1999-0019 |
CVE-1999-0019 | Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0019. | Delete or create a file via rpc.statd, due to invalid information. |
CVE-1999-0019 | Provide references for further information: Can you share references or external links related to CVE-1999-0019? | {'name': '00135', 'tags': ['vendor-advisory', 'x_refsource_SUN'], 'url': 'http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/135'} |
CVE-1999-0019 | Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0019? | PUBLISHED |
CVE-1999-0020 | Explain the CVE ID: What does the identifier CVE-1999-0020 mean in the context of cybersecurity? | CVE-1999-0020 |
CVE-1999-0020 | Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0020. | N\A |
CVE-1999-0020 | Provide references for further information: Can you share references or external links related to CVE-1999-0020? | N\A |
CVE-1999-0020 | Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0020? | REJECTED |
CVE-1999-0021 | Explain the CVE ID: What does the identifier CVE-1999-0021 mean in the context of cybersecurity? | CVE-1999-0021 |
CVE-1999-0021 | Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0021. | Arbitrary command execution via buffer overflow in Count.cgi (wwwcount) cgi-bin program. |
CVE-1999-0021 | Provide references for further information: Can you share references or external links related to CVE-1999-0021? | {'name': '128', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/128'} |
CVE-1999-0021 | Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0021? | PUBLISHED |
CVE-1999-0022 | Explain the CVE ID: What does the identifier CVE-1999-0022 mean in the context of cybersecurity? | CVE-1999-0022 |
CVE-1999-0022 | Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0022. | Local user gains root privileges via buffer overflow in rdist, via expstr() function. |
CVE-1999-0022 | Provide references for further information: Can you share references or external links related to CVE-1999-0022? | {'name': '00179', 'tags': ['vendor-advisory', 'x_refsource_SUN'], 'url': 'http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/179'} |
CVE-1999-0022 | Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0022? | PUBLISHED |
CVE-1999-0023 | Explain the CVE ID: What does the identifier CVE-1999-0023 mean in the context of cybersecurity? | CVE-1999-0023 |
CVE-1999-0023 | Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0023. | Local user gains root privileges via buffer overflow in rdist, via lookup() function. |
CVE-1999-0023 | Provide references for further information: Can you share references or external links related to CVE-1999-0023? | {'tags': ['x_refsource_MISC'], 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0023'} |
CVE-1999-0023 | Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0023? | PUBLISHED |
CVE-1999-0024 | Explain the CVE ID: What does the identifier CVE-1999-0024 mean in the context of cybersecurity? | CVE-1999-0024 |
CVE-1999-0024 | Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0024. | DNS cache poisoning via BIND, by predictable query IDs. |
CVE-1999-0024 | Provide references for further information: Can you share references or external links related to CVE-1999-0024? | {'tags': ['x_refsource_MISC'], 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0024'} |
CVE-1999-0024 | Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0024? | PUBLISHED |
CVE-1999-0025 | Explain the CVE ID: What does the identifier CVE-1999-0025 mean in the context of cybersecurity? | CVE-1999-0025 |
CVE-1999-0025 | Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0025. | root privileges via buffer overflow in df command on SGI IRIX systems. |
CVE-1999-0025 | Provide references for further information: Can you share references or external links related to CVE-1999-0025? | {'name': 'VU#20851', 'tags': ['third-party-advisory', 'x_refsource_CERT-VN'], 'url': 'http://www.kb.cert.org/vuls/id/20851'}, {'name': 'df-bo(440)', 'tags': ['vdb-entry', 'x_refsource_XF'], 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/440'}, {'name': '346', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/346'}, {'name': 'CA-1997-21', 'tags': ['third-party-advisory', 'x_refsource_CERT'], 'url': 'http://www.cert.org/advisories/CA-1997-21.html'} |
CVE-1999-0025 | Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0025? | PUBLISHED |
CVE-llm_dataset
This dataset is intended to train an LLM model for an utterly CVE-focused input and output.
Data extraction:
For the data extraction, I first downloaded the CVE database from NVD lists and then loaded them using the cve_dataset_2.py
and cve_dataset.py
both have produce different datasets one is for llama and the other is for openai GPT.
The CVE json files are mapped in this format:
cves:
|
├─1999
| ├─0xxx
| | ├─CVE-1999-0001.json
| | ├─....
| | └─CVE-1999-0999.json
| └─1xxx
| ├─CVE-1999-1000.json
| ├─....
| └─CVE-1999-1598.json
└─2023
The programs traverse through these folders extract the data in the files and arrange them into usable formats for the fine-tuning process.
llama2 and Openai Model dataset:
The llama2 fine-tuned dataset follows this format:
{
"instruction": "Explain CVE-1999-0001",
"input": "Explain the vulnerability: CVE-1999-0001",
"output": "ip_input.c in BSD-derived TCP/IP implementations allows remote attackers to cause a denial of service (crash or hang) via crafted packets.\nAffected Products: n/a\nReferences: [{'tags': ['x_refsource_CONFIRM'], 'url': 'http://www.openbsd.org/errata23.html#tcpfix'}, {'name': '5707', 'tags': ['vdb-entry', 'x_refsource_OSVDB'], 'url': 'http://www.osvdb.org/5707'}]\nCVE State: PUBLISHED"
}
The openai fine-tune dataset follows this format:
{
"messages": [
{"role": "system", "content": "CVE Vulnerability Information"},
{"role": "user", "content": f"Explain the CVE ID: What does the identifier {cve_id} mean in the context of cybersecurity?"},
{"role": "assistant", "content": cve_id}
]
},
{
"messages": [
{"role": "system", "content": "CVE Vulnerability Information"},
{"role": "user", "content": f"Describe the vulnerability: Provide detailed information about the vulnerability for {cve_id}."},
{"role": "assistant", "content": description}
]
},
{
"messages": [
{"role": "system", "content": "CVE Vulnerability Information"},
{"role": "user", "content": f"Provide references for further information: Can you share references or external links related to {cve_id}?"},
{"role": "assistant", "content": references}
]
},
{
"messages": [
{"role": "system", "content": "CVE Vulnerability Information"},
{"role": "user", "content": f"Explain the state of this CVE: What is the publication or resolution state of {cve_id}?"},
{"role": "assistant", "content": cve_state}
]
}
The instruction is what we instruct the AI to do with the data provided For example we can command the AI To take in user input analyze it and then based on what he asks returns an answer
This is also where we can add a role
or a personal
to the AI.
The input is the user Input of the main query or data that must be processed by the AI. This is a crucial piece of information that the AI will process in order to provide an output.
The output is the format that we define and tell the AI to generate answers in that format or provide that answer to the question asked.
- Downloads last month
- 67