Dataset Preview
Full Screen
The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
The dataset generation failed
Error code:   DatasetGenerationError
Exception:    ArrowInvalid
Message:      JSON parse error: Column(/messages/[]/content) changed from string to array in row 2
Traceback:    Traceback (most recent call last):
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/packaged_modules/json/json.py", line 160, in _generate_tables
                  df = pandas_read_json(f)
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/packaged_modules/json/json.py", line 38, in pandas_read_json
                  return pd.read_json(path_or_buf, **kwargs)
                File "/src/services/worker/.venv/lib/python3.9/site-packages/pandas/io/json/_json.py", line 815, in read_json
                  return json_reader.read()
                File "/src/services/worker/.venv/lib/python3.9/site-packages/pandas/io/json/_json.py", line 1025, in read
                  obj = self._get_object_parser(self.data)
                File "/src/services/worker/.venv/lib/python3.9/site-packages/pandas/io/json/_json.py", line 1051, in _get_object_parser
                  obj = FrameParser(json, **kwargs).parse()
                File "/src/services/worker/.venv/lib/python3.9/site-packages/pandas/io/json/_json.py", line 1187, in parse
                  self._parse()
                File "/src/services/worker/.venv/lib/python3.9/site-packages/pandas/io/json/_json.py", line 1403, in _parse
                  ujson_loads(json, precise_float=self.precise_float), dtype=None
              ValueError: Trailing data
              
              During handling of the above exception, another exception occurred:
              
              Traceback (most recent call last):
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1854, in _prepare_split_single
                  for _, table in generator:
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/packaged_modules/json/json.py", line 163, in _generate_tables
                  raise e
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/packaged_modules/json/json.py", line 137, in _generate_tables
                  pa_table = paj.read_json(
                File "pyarrow/_json.pyx", line 308, in pyarrow._json.read_json
                File "pyarrow/error.pxi", line 154, in pyarrow.lib.pyarrow_internal_check_status
                File "pyarrow/error.pxi", line 91, in pyarrow.lib.check_status
              pyarrow.lib.ArrowInvalid: JSON parse error: Column(/messages/[]/content) changed from string to array in row 2
              
              The above exception was the direct cause of the following exception:
              
              Traceback (most recent call last):
                File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1417, in compute_config_parquet_and_info_response
                  parquet_operations = convert_to_parquet(builder)
                File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1049, in convert_to_parquet
                  builder.download_and_prepare(
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 924, in download_and_prepare
                  self._download_and_prepare(
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1000, in _download_and_prepare
                  self._prepare_split(split_generator, **prepare_split_kwargs)
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1741, in _prepare_split
                  for job_id, done, content in self._prepare_split_single(
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1897, in _prepare_split_single
                  raise DatasetGenerationError("An error occurred while generating the dataset") from e
              datasets.exceptions.DatasetGenerationError: An error occurred while generating the dataset

Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.

CVE ID
string
Human Input
string
Analyst Response
string
CVE-1999-0001
Explain the CVE ID: What does the identifier CVE-1999-0001 mean in the context of cybersecurity?
CVE-1999-0001
CVE-1999-0001
Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0001.
ip_input.c in BSD-derived TCP/IP implementations allows remote attackers to cause a denial of service (crash or hang) via crafted packets.
CVE-1999-0001
Provide references for further information: Can you share references or external links related to CVE-1999-0001?
{'tags': ['x_refsource_CONFIRM'], 'url': 'http://www.openbsd.org/errata23.html#tcpfix'}, {'name': '5707', 'tags': ['vdb-entry', 'x_refsource_OSVDB'], 'url': 'http://www.osvdb.org/5707'}
CVE-1999-0001
Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0001?
PUBLISHED
CVE-1999-0002
Explain the CVE ID: What does the identifier CVE-1999-0002 mean in the context of cybersecurity?
CVE-1999-0002
CVE-1999-0002
Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0002.
Buffer overflow in NFS mountd gives root access to remote attackers, mostly in Linux systems.
CVE-1999-0002
Provide references for further information: Can you share references or external links related to CVE-1999-0002?
{'name': 'J-006', 'tags': ['third-party-advisory', 'government-resource', 'x_refsource_CIAC'], 'url': 'http://www.ciac.org/ciac/bulletins/j-006.shtml'}, {'name': '19981006-01-I', 'tags': ['vendor-advisory', 'x_refsource_SGI'], 'url': 'ftp://patches.sgi.com/support/free/security/advisories/19981006-01-I'}, {'name': '121', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/121'}
CVE-1999-0002
Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0002?
PUBLISHED
CVE-1999-0003
Explain the CVE ID: What does the identifier CVE-1999-0003 mean in the context of cybersecurity?
CVE-1999-0003
CVE-1999-0003
Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0003.
Execute commands as root via buffer overflow in Tooltalk database server (rpc.ttdbserverd).
CVE-1999-0003
Provide references for further information: Can you share references or external links related to CVE-1999-0003?
{'name': '122', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/122'}, {'name': '19981101-01-A', 'tags': ['vendor-advisory', 'x_refsource_SGI'], 'url': 'ftp://patches.sgi.com/support/free/security/advisories/19981101-01-A'}, {'name': '19981101-01-PX', 'tags': ['vendor-advisory', 'x_refsource_SGI'], 'url': 'ftp://patches.sgi.com/support/free/security/advisories/19981101-01-PX'}
CVE-1999-0003
Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0003?
PUBLISHED
CVE-1999-0004
Explain the CVE ID: What does the identifier CVE-1999-0004 mean in the context of cybersecurity?
CVE-1999-0004
CVE-1999-0004
Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0004.
MIME buffer overflow in email clients, e.g. Solaris mailtool and Outlook.
CVE-1999-0004
Provide references for further information: Can you share references or external links related to CVE-1999-0004?
{'name': 'MS98-008', 'tags': ['vendor-advisory', 'x_refsource_MS'], 'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-008'}
CVE-1999-0004
Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0004?
PUBLISHED
CVE-1999-0005
Explain the CVE ID: What does the identifier CVE-1999-0005 mean in the context of cybersecurity?
CVE-1999-0005
CVE-1999-0005
Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0005.
Arbitrary command execution via IMAP buffer overflow in authenticate command.
CVE-1999-0005
Provide references for further information: Can you share references or external links related to CVE-1999-0005?
{'name': '130', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/130'}, {'name': '00177', 'tags': ['vendor-advisory', 'x_refsource_SUN'], 'url': 'http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/177'}
CVE-1999-0005
Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0005?
PUBLISHED
CVE-1999-0006
Explain the CVE ID: What does the identifier CVE-1999-0006 mean in the context of cybersecurity?
CVE-1999-0006
CVE-1999-0006
Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0006.
Buffer overflow in POP servers based on BSD/Qualcomm's qpopper allows remote attackers to gain root access using a long PASS command.
CVE-1999-0006
Provide references for further information: Can you share references or external links related to CVE-1999-0006?
{'name': '19980801-01-I', 'tags': ['vendor-advisory', 'x_refsource_SGI'], 'url': 'ftp://patches.sgi.com/support/free/security/advisories/19980801-01-I'}, {'name': '133', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/133'}
CVE-1999-0006
Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0006?
PUBLISHED
CVE-1999-0007
Explain the CVE ID: What does the identifier CVE-1999-0007 mean in the context of cybersecurity?
CVE-1999-0007
CVE-1999-0007
Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0007.
Information from SSL-encrypted sessions via PKCS #1.
CVE-1999-0007
Provide references for further information: Can you share references or external links related to CVE-1999-0007?
{'name': 'MS98-002', 'tags': ['vendor-advisory', 'x_refsource_MS'], 'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-002'}
CVE-1999-0007
Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0007?
PUBLISHED
CVE-1999-0008
Explain the CVE ID: What does the identifier CVE-1999-0008 mean in the context of cybersecurity?
CVE-1999-0008
CVE-1999-0008
Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0008.
Buffer overflow in NIS+, in Sun's rpc.nisd program.
CVE-1999-0008
Provide references for further information: Can you share references or external links related to CVE-1999-0008?
{'name': '00170', 'tags': ['vendor-advisory', 'x_refsource_SUN'], 'url': 'http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/170'}
CVE-1999-0008
Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0008?
PUBLISHED
CVE-1999-0009
Explain the CVE ID: What does the identifier CVE-1999-0009 mean in the context of cybersecurity?
CVE-1999-0009
CVE-1999-0009
Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0009.
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.
CVE-1999-0009
Provide references for further information: Can you share references or external links related to CVE-1999-0009?
{'name': '19980603-01-PX', 'tags': ['vendor-advisory', 'x_refsource_SGI'], 'url': 'ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX'}, {'name': '134', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/134'}, {'name': 'HPSBUX9808-083', 'tags': ['vendor-advisory', 'x_refsource_HP'], 'url': 'http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083'}, {'name': '00180', 'tags': ['vendor-advisory', 'x_refsource_SUN'], 'url': 'http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/180'}
CVE-1999-0009
Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0009?
PUBLISHED
CVE-1999-0010
Explain the CVE ID: What does the identifier CVE-1999-0010 mean in the context of cybersecurity?
CVE-1999-0010
CVE-1999-0010
Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0010.
Denial of Service vulnerability in BIND 8 Releases via maliciously formatted DNS messages.
CVE-1999-0010
Provide references for further information: Can you share references or external links related to CVE-1999-0010?
{'name': '19980603-01-PX', 'tags': ['vendor-advisory', 'x_refsource_SGI'], 'url': 'ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX'}, {'name': 'HPSBUX9808-083', 'tags': ['vendor-advisory', 'x_refsource_HP'], 'url': 'http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083'}
CVE-1999-0010
Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0010?
PUBLISHED
CVE-1999-0011
Explain the CVE ID: What does the identifier CVE-1999-0011 mean in the context of cybersecurity?
CVE-1999-0011
CVE-1999-0011
Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0011.
Denial of Service vulnerabilities in BIND 4.9 and BIND 8 Releases via CNAME record and zone transfer.
CVE-1999-0011
Provide references for further information: Can you share references or external links related to CVE-1999-0011?
{'name': '19980603-01-PX', 'tags': ['vendor-advisory', 'x_refsource_SGI'], 'url': 'ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX'}, {'name': 'HPSBUX9808-083', 'tags': ['vendor-advisory', 'x_refsource_HP'], 'url': 'http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083'}, {'name': '00180', 'tags': ['vendor-advisory', 'x_refsource_SUN'], 'url': 'http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/180'}
CVE-1999-0011
Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0011?
PUBLISHED
CVE-1999-0012
Explain the CVE ID: What does the identifier CVE-1999-0012 mean in the context of cybersecurity?
CVE-1999-0012
CVE-1999-0012
Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0012.
Some web servers under Microsoft Windows allow remote attackers to bypass access restrictions for files with long file names.
CVE-1999-0012
Provide references for further information: Can you share references or external links related to CVE-1999-0012?
{'tags': ['x_refsource_MISC'], 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0012'}
CVE-1999-0012
Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0012?
PUBLISHED
CVE-1999-0013
Explain the CVE ID: What does the identifier CVE-1999-0013 mean in the context of cybersecurity?
CVE-1999-0013
CVE-1999-0013
Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0013.
Stolen credentials from SSH clients via ssh-agent program, allowing other local users to access remote accounts belonging to the ssh-agent user.
CVE-1999-0013
Provide references for further information: Can you share references or external links related to CVE-1999-0013?
{'tags': ['x_refsource_MISC'], 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0013'}
CVE-1999-0013
Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0013?
PUBLISHED
CVE-1999-0014
Explain the CVE ID: What does the identifier CVE-1999-0014 mean in the context of cybersecurity?
CVE-1999-0014
CVE-1999-0014
Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0014.
Unauthorized privileged access or denial of service via dtappgather program in CDE.
CVE-1999-0014
Provide references for further information: Can you share references or external links related to CVE-1999-0014?
{'name': 'HPSBUX9801-075', 'tags': ['vendor-advisory', 'x_refsource_HP'], 'url': 'http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9801-075'}, {'name': '00185', 'tags': ['vendor-advisory', 'x_refsource_SUN'], 'url': 'http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/185'}
CVE-1999-0014
Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0014?
PUBLISHED
CVE-1999-0015
Explain the CVE ID: What does the identifier CVE-1999-0015 mean in the context of cybersecurity?
CVE-1999-0015
CVE-1999-0015
Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0015.
Teardrop IP denial of service.
CVE-1999-0015
Provide references for further information: Can you share references or external links related to CVE-1999-0015?
{'name': 'oval:org.mitre.oval:def:5579', 'tags': ['vdb-entry', 'signature', 'x_refsource_OVAL'], 'url': 'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5579'}
CVE-1999-0015
Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0015?
PUBLISHED
CVE-1999-0016
Explain the CVE ID: What does the identifier CVE-1999-0016 mean in the context of cybersecurity?
CVE-1999-0016
CVE-1999-0016
Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0016.
Land IP denial of service.
CVE-1999-0016
Provide references for further information: Can you share references or external links related to CVE-1999-0016?
{'name': 'HPSBUX9801-076', 'tags': ['vendor-advisory', 'x_refsource_HP'], 'url': 'http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9801-076'}
CVE-1999-0016
Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0016?
PUBLISHED
CVE-1999-0017
Explain the CVE ID: What does the identifier CVE-1999-0017 mean in the context of cybersecurity?
CVE-1999-0017
CVE-1999-0017
Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0017.
FTP servers can allow an attacker to connect to arbitrary ports on machines other than the FTP client, aka FTP bounce.
CVE-1999-0017
Provide references for further information: Can you share references or external links related to CVE-1999-0017?
{'tags': ['x_refsource_MISC'], 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0017'}
CVE-1999-0017
Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0017?
PUBLISHED
CVE-1999-0018
Explain the CVE ID: What does the identifier CVE-1999-0018 mean in the context of cybersecurity?
CVE-1999-0018
CVE-1999-0018
Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0018.
Buffer overflow in statd allows root privileges.
CVE-1999-0018
Provide references for further information: Can you share references or external links related to CVE-1999-0018?
{'name': '127', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/127'}
CVE-1999-0018
Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0018?
PUBLISHED
CVE-1999-0019
Explain the CVE ID: What does the identifier CVE-1999-0019 mean in the context of cybersecurity?
CVE-1999-0019
CVE-1999-0019
Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0019.
Delete or create a file via rpc.statd, due to invalid information.
CVE-1999-0019
Provide references for further information: Can you share references or external links related to CVE-1999-0019?
{'name': '00135', 'tags': ['vendor-advisory', 'x_refsource_SUN'], 'url': 'http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/135'}
CVE-1999-0019
Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0019?
PUBLISHED
CVE-1999-0020
Explain the CVE ID: What does the identifier CVE-1999-0020 mean in the context of cybersecurity?
CVE-1999-0020
CVE-1999-0020
Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0020.
N\A
CVE-1999-0020
Provide references for further information: Can you share references or external links related to CVE-1999-0020?
N\A
CVE-1999-0020
Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0020?
REJECTED
CVE-1999-0021
Explain the CVE ID: What does the identifier CVE-1999-0021 mean in the context of cybersecurity?
CVE-1999-0021
CVE-1999-0021
Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0021.
Arbitrary command execution via buffer overflow in Count.cgi (wwwcount) cgi-bin program.
CVE-1999-0021
Provide references for further information: Can you share references or external links related to CVE-1999-0021?
{'name': '128', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/128'}
CVE-1999-0021
Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0021?
PUBLISHED
CVE-1999-0022
Explain the CVE ID: What does the identifier CVE-1999-0022 mean in the context of cybersecurity?
CVE-1999-0022
CVE-1999-0022
Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0022.
Local user gains root privileges via buffer overflow in rdist, via expstr() function.
CVE-1999-0022
Provide references for further information: Can you share references or external links related to CVE-1999-0022?
{'name': '00179', 'tags': ['vendor-advisory', 'x_refsource_SUN'], 'url': 'http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/179'}
CVE-1999-0022
Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0022?
PUBLISHED
CVE-1999-0023
Explain the CVE ID: What does the identifier CVE-1999-0023 mean in the context of cybersecurity?
CVE-1999-0023
CVE-1999-0023
Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0023.
Local user gains root privileges via buffer overflow in rdist, via lookup() function.
CVE-1999-0023
Provide references for further information: Can you share references or external links related to CVE-1999-0023?
{'tags': ['x_refsource_MISC'], 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0023'}
CVE-1999-0023
Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0023?
PUBLISHED
CVE-1999-0024
Explain the CVE ID: What does the identifier CVE-1999-0024 mean in the context of cybersecurity?
CVE-1999-0024
CVE-1999-0024
Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0024.
DNS cache poisoning via BIND, by predictable query IDs.
CVE-1999-0024
Provide references for further information: Can you share references or external links related to CVE-1999-0024?
{'tags': ['x_refsource_MISC'], 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0024'}
CVE-1999-0024
Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0024?
PUBLISHED
CVE-1999-0025
Explain the CVE ID: What does the identifier CVE-1999-0025 mean in the context of cybersecurity?
CVE-1999-0025
CVE-1999-0025
Describe the vulnerability: Provide detailed information about the vulnerability for CVE-1999-0025.
root privileges via buffer overflow in df command on SGI IRIX systems.
CVE-1999-0025
Provide references for further information: Can you share references or external links related to CVE-1999-0025?
{'name': 'VU#20851', 'tags': ['third-party-advisory', 'x_refsource_CERT-VN'], 'url': 'http://www.kb.cert.org/vuls/id/20851'}, {'name': 'df-bo(440)', 'tags': ['vdb-entry', 'x_refsource_XF'], 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/440'}, {'name': '346', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/346'}, {'name': 'CA-1997-21', 'tags': ['third-party-advisory', 'x_refsource_CERT'], 'url': 'http://www.cert.org/advisories/CA-1997-21.html'}
CVE-1999-0025
Explain the state of this CVE: What is the publication or resolution state of CVE-1999-0025?
PUBLISHED
End of preview.

CVE-llm_dataset

This dataset is intended to train an LLM model for an utterly CVE-focused input and output.

Data extraction:

For the data extraction, I first downloaded the CVE database from NVD lists and then loaded them using the cve_dataset_2.py and cve_dataset.py both have produce different datasets one is for llama and the other is for openai GPT.

The CVE json files are mapped in this format:

cves:
|
├─1999
|   ├─0xxx
|   |   ├─CVE-1999-0001.json
|   |   ├─....
|   |   └─CVE-1999-0999.json
|   └─1xxx
|      ├─CVE-1999-1000.json
|      ├─....
|      └─CVE-1999-1598.json
└─2023

The programs traverse through these folders extract the data in the files and arrange them into usable formats for the fine-tuning process.

llama2 and Openai Model dataset:

The llama2 fine-tuned dataset follows this format:

    {
        "instruction": "Explain CVE-1999-0001",
        "input": "Explain the vulnerability: CVE-1999-0001",
        "output": "ip_input.c in BSD-derived TCP/IP implementations allows remote attackers to cause a denial of service (crash or hang) via crafted packets.\nAffected Products: n/a\nReferences: [{'tags': ['x_refsource_CONFIRM'], 'url': 'http://www.openbsd.org/errata23.html#tcpfix'}, {'name': '5707', 'tags': ['vdb-entry', 'x_refsource_OSVDB'], 'url': 'http://www.osvdb.org/5707'}]\nCVE State: PUBLISHED"
    }

The openai fine-tune dataset follows this format:

        {
            "messages": [
                {"role": "system", "content": "CVE Vulnerability Information"},
                {"role": "user", "content": f"Explain the CVE ID: What does the identifier {cve_id} mean in the context of cybersecurity?"},
                {"role": "assistant", "content": cve_id}
            ]
        },
        {
            "messages": [
                {"role": "system", "content": "CVE Vulnerability Information"},
                {"role": "user", "content": f"Describe the vulnerability: Provide detailed information about the vulnerability for {cve_id}."},
                {"role": "assistant", "content": description}
            ]
        },
        {
            "messages": [
                {"role": "system", "content": "CVE Vulnerability Information"},
                {"role": "user", "content": f"Provide references for further information: Can you share references or external links related to {cve_id}?"},
                {"role": "assistant", "content": references}
            ]
        },
        {
            "messages": [
                {"role": "system", "content": "CVE Vulnerability Information"},
                {"role": "user", "content": f"Explain the state of this CVE: What is the publication or resolution state of {cve_id}?"},
                {"role": "assistant", "content": cve_state}
            ]
        }

The instruction is what we instruct the AI to do with the data provided For example we can command the AI To take in user input analyze it and then based on what he asks returns an answer This is also where we can add a role or a personal to the AI.

The input is the user Input of the main query or data that must be processed by the AI. This is a crucial piece of information that the AI will process in order to provide an output.

The output is the format that we define and tell the AI to generate answers in that format or provide that answer to the question asked.

Downloads last month
115

Models trained or fine-tuned on morpheuslord/cve-llm-training