Datasets:
Upload 21 files
Browse files- .gitattributes +1 -0
- 90-days.zip +3 -0
- README.md +207 -83
- demo/OVX_quickstart.html +425 -0
- demo/OVX_quickstart.ipynb +485 -0
- demo/requirements-colab.txt +8 -0
- docs/BUILD_MANIFEST.json +1 -0
- docs/INTEGRITY.txt +11 -0
- docs/LICENCE.md +121 -0
- docs/LICENSES.md +41 -0
- docs/NOTICE.md +25 -0
- docs/VALIDATION.json +1 -0
- parquet/.counts.json +1 -0
- parquet/cve.parquet +3 -0
- parquet/edges.parquet +3 -0
- parquet/kev.parquet +3 -0
- parquet/nvd_meta.parquet +3 -0
- parquet/preview.parquet +3 -0
- rag/index.faiss +3 -0
- rag/mapping.parquet +3 -0
- rag/meta.parquet +3 -0
- rag/vectors.npy +3 -0
.gitattributes
CHANGED
|
@@ -57,3 +57,4 @@ saved_model/**/* filter=lfs diff=lfs merge=lfs -text
|
|
| 57 |
# Video files - compressed
|
| 58 |
*.mp4 filter=lfs diff=lfs merge=lfs -text
|
| 59 |
*.webm filter=lfs diff=lfs merge=lfs -text
|
|
|
|
|
|
| 57 |
# Video files - compressed
|
| 58 |
*.mp4 filter=lfs diff=lfs merge=lfs -text
|
| 59 |
*.webm filter=lfs diff=lfs merge=lfs -text
|
| 60 |
+
rag/index.faiss filter=lfs diff=lfs merge=lfs -text
|
90-days.zip
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:cc5f0733ff67e793c19d5e645ce4693b5b9e2c2c1dc2213607875829931b06e1
|
| 3 |
+
size 39290478
|
README.md
CHANGED
|
@@ -1,56 +1,27 @@
|
|
| 1 |
---
|
| 2 |
license: cc0-1.0
|
| 3 |
tags:
|
| 4 |
-
- security
|
| 5 |
-
- cybersecurity
|
| 6 |
-
- cve
|
| 7 |
-
- cisa
|
| 8 |
-
- kev
|
| 9 |
-
- nvd
|
| 10 |
-
- parquet
|
| 11 |
-
- rag
|
| 12 |
-
- public-domain
|
| 13 |
-
pretty_name: CVE-KEV Snapshot (2025-10-
|
| 14 |
-
viewer: true
|
| 15 |
-
configs:
|
| 16 |
-
- config_name: preview
|
| 17 |
-
data_files:
|
| 18 |
-
- split: train
|
| 19 |
-
path: parquet/preview.parquet
|
| 20 |
-
- config_name: cve
|
| 21 |
-
data_files:
|
| 22 |
-
- split: train
|
| 23 |
-
path: parquet/cve.parquet
|
| 24 |
-
- config_name: nvd_meta
|
| 25 |
-
data_files:
|
| 26 |
-
- split: train
|
| 27 |
-
path: parquet/nvd_meta.parquet
|
| 28 |
-
- config_name: kev
|
| 29 |
-
data_files:
|
| 30 |
-
- split: train
|
| 31 |
-
path: parquet/kev.parquet
|
| 32 |
-
- config_name: edges
|
| 33 |
-
data_files:
|
| 34 |
-
- split: train
|
| 35 |
-
path: parquet/edges.parquet
|
| 36 |
-
- config_name: rag_meta
|
| 37 |
-
data_files:
|
| 38 |
-
- split: train
|
| 39 |
-
path: rag/meta.parquet
|
| 40 |
-
- config_name: rag_mapping
|
| 41 |
-
data_files:
|
| 42 |
-
- split: train
|
| 43 |
-
path: rag/mapping.parquet
|
| 44 |
---
|
| 45 |
|
| 46 |
-
|
| 47 |
|
| 48 |
This bundle lets you rank likely exploited CVEs and cite official sources without any APIs or accounts, fully offline. It’s a one-time snapshot of the last 90 days of NVD, aligned with CISA KEV for immediate focus on likely exploited CVEs. Query-ready Parquet tables and an optional small RAG pack let you rank by severity, pivot by CWE, and fetch references for briefings. Every row includes provenance; validation metrics and an integrity manifest are included. The compiled dataset is dedicated to the public domain (CC0).
|
| 49 |
|
| 50 |
## Quick start (60 seconds)
|
| 51 |
|
| 52 |
-
- Open `demo/OVX_quickstart.html` (no network) or
|
| 53 |
- Or run this DuckDB query for top KEV CVEs by severity:
|
|
|
|
| 54 |
```sql
|
| 55 |
SELECT c.cve_id, m.cvss_v3_score, k.date_added
|
| 56 |
FROM read_parquet('parquet/kev.parquet') k
|
|
@@ -60,54 +31,219 @@ ORDER BY (m.cvss_v3_score IS NULL) ASC, m.cvss_v3_score DESC, k.date_added DESC
|
|
| 60 |
LIMIT 20;
|
| 61 |
```
|
| 62 |
|
| 63 |
-
|
| 64 |
-
|
| 65 |
-
- Snapshot as of (UTC): 2025-09-05T02:12:27Z
|
| 66 |
-
- NVD window (days): 90
|
| 67 |
|
| 68 |
## Accuracy at a glance
|
| 69 |
|
| 70 |
-
- Total CVE rows:
|
| 71 |
-
- Total KEV rows:
|
| 72 |
-
- Artifacts: [Validation Report](docs/VALIDATION.json) · [Integrity Check](docs/INTEGRITY.txt) · [Build Manifest](docs/BUILD_MANIFEST.json)
|
| 73 |
- KEV is window‑aligned; within‑window coverage = 1.0 by design. See `docs/VALIDATION.json` for `kev_rows_total_fetched`, `kev_rows_within_window`, `kev_rows_filtered_out`, and `kev_within_window_over_global_ratio`.
|
| 74 |
|
| 75 |
-
##
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 76 |
|
| 77 |
-
-
|
| 78 |
-
-
|
| 79 |
-
-
|
| 80 |
-
-
|
| 81 |
|
| 82 |
-
##
|
| 83 |
|
| 84 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 85 |
|
| 86 |
## Preview parquet
|
| 87 |
|
| 88 |
-
-
|
| 89 |
- Selection: first 1000 rows by `cve_id` ordering from `parquet/cve.parquet`.
|
| 90 |
-
- Columns: `cve_id`, `summary`, `published_date`, `modified_date` (when available); falls back to a best
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 91 |
|
| 92 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 93 |
|
| 94 |
-
|
| 95 |
-
- URL checks (if present) were executed conservatively with a single worker.
|
| 96 |
-
- Verify integrity locally:
|
| 97 |
-
- macOS: `shasum -a 256 -c docs/INTEGRITY.txt`
|
| 98 |
-
- Linux: `sha256sum -c docs/INTEGRITY.txt`
|
| 99 |
-
- Build metadata (transparency): see `docs/BUILD_MANIFEST.json` for snapshot parameters (timestamp, NVD window, tool/version info, internal commit/config). Provided for transparency; the build system is not included.
|
| 100 |
|
| 101 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 102 |
|
| 103 |
-
|
| 104 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 105 |
|
| 106 |
## Limitations
|
| 107 |
|
| 108 |
-
- Some CVEs may lack CVSS vectors/scores
|
| 109 |
-
- URL checks are conservative and may still include dead
|
| 110 |
-
- KEV rows are filtered to the NVD window; counts reflect in
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 111 |
|
| 112 |
## Usage
|
| 113 |
|
|
@@ -141,16 +277,4 @@ df = k.join(c, on='cve_id').join(m, on='cve_id', how='left')
|
|
| 141 |
print(df.head())
|
| 142 |
```
|
| 143 |
|
| 144 |
-
## Non-affiliation and licensing
|
| 145 |
-
|
| 146 |
-
- Not affiliated with NIST/NVD, CISA/KEV, or FIRST/EPSS.
|
| 147 |
-
- NVD non-endorsement: "This product uses data from the NVD API but is not endorsed or certified by the NVD."
|
| 148 |
-
- Compiled artifact dedicated to the public domain under CC0 1.0 (see `docs/LICENCE.md`).
|
| 149 |
-
- Upstream sources: NVD (public domain), CISA KEV (CC0). Linked third‑party pages (vendor advisories, blogs, etc.) are governed by their own terms.
|
| 150 |
|
| 151 |
-
## Citation
|
| 152 |
-
|
| 153 |
-
If you use this snapshot, please cite:
|
| 154 |
-
```
|
| 155 |
-
"CVE-KEV Snapshot (${snapshot_as_of})", CC0-1.0, https://huggingface.co/datasets/NostromoHub/cve-kev-snapshot-90d-2025-10-29
|
| 156 |
-
```
|
|
|
|
| 1 |
---
|
| 2 |
license: cc0-1.0
|
| 3 |
tags:
|
| 4 |
+
- security
|
| 5 |
+
- cybersecurity
|
| 6 |
+
- cve
|
| 7 |
+
- cisa
|
| 8 |
+
- kev
|
| 9 |
+
- nvd
|
| 10 |
+
- parquet
|
| 11 |
+
- rag
|
| 12 |
+
- public-domain
|
| 13 |
+
pretty_name: CVE-KEV Snapshot (2025-10-29T13:51:37Z)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 14 |
---
|
| 15 |
|
| 16 |
+
# CVE-KEV Snapshot (one-time, offline bundle)
|
| 17 |
|
| 18 |
This bundle lets you rank likely exploited CVEs and cite official sources without any APIs or accounts, fully offline. It’s a one-time snapshot of the last 90 days of NVD, aligned with CISA KEV for immediate focus on likely exploited CVEs. Query-ready Parquet tables and an optional small RAG pack let you rank by severity, pivot by CWE, and fetch references for briefings. Every row includes provenance; validation metrics and an integrity manifest are included. The compiled dataset is dedicated to the public domain (CC0).
|
| 19 |
|
| 20 |
## Quick start (60 seconds)
|
| 21 |
|
| 22 |
+
- Open `demo/OVX_quickstart.html` (no network) or `demo/OVX_quickstart.ipynb`.
|
| 23 |
- Or run this DuckDB query for top KEV CVEs by severity:
|
| 24 |
+
|
| 25 |
```sql
|
| 26 |
SELECT c.cve_id, m.cvss_v3_score, k.date_added
|
| 27 |
FROM read_parquet('parquet/kev.parquet') k
|
|
|
|
| 31 |
LIMIT 20;
|
| 32 |
```
|
| 33 |
|
| 34 |
+
Snapshot as of (UTC): 2025-10-29T13:51:37Z
|
| 35 |
+
NVD window (days): 90
|
|
|
|
|
|
|
| 36 |
|
| 37 |
## Accuracy at a glance
|
| 38 |
|
| 39 |
+
- Total CVE rows: 12307
|
| 40 |
+
- Total KEV rows: 28
|
| 41 |
+
- Artifacts: [Validation Report](docs/VALIDATION.json) · [Integrity Check](docs/INTEGRITY.txt) · [Build Manifest](docs/BUILD_MANIFEST.json)
|
| 42 |
- KEV is window‑aligned; within‑window coverage = 1.0 by design. See `docs/VALIDATION.json` for `kev_rows_total_fetched`, `kev_rows_within_window`, `kev_rows_filtered_out`, and `kev_within_window_over_global_ratio`.
|
| 43 |
|
| 44 |
+
## What this is
|
| 45 |
+
|
| 46 |
+
A single, immutable dataset combining:
|
| 47 |
+
- CVE records (IDs, summaries) with CVSS and CWE from NVD (public domain)
|
| 48 |
+
- KEV flags from CISA (CC0)
|
| 49 |
+
- Provenance on every row and edge (source, source_url, retrieved_at, source_record_hash)
|
| 50 |
+
- A tiny RAG pack (embeddings + FAISS index) built only from PD/CC0 text
|
| 51 |
+
|
| 52 |
+
## Who this is for
|
| 53 |
+
|
| 54 |
+
- Security ML teams: feature prototyping (KEV=true, CVSS, CWE signals)
|
| 55 |
+
- RAG/QA prototypers: grounded retrieval with official citations
|
| 56 |
+
- Analysts: local, verifiable artifact (no APIs/accounts)
|
| 57 |
+
|
| 58 |
+
## What you can do quickly (offline)
|
| 59 |
+
|
| 60 |
+
- Rank KEV CVEs by severity; pivot by CWE categories
|
| 61 |
+
- Retrieve references for a CVE (official NVD/KEV links)
|
| 62 |
+
- Trial RAG with a tiny index (if the embedding model is cached locally)
|
| 63 |
+
- Inspect validation metrics and per-row provenance
|
| 64 |
+
|
| 65 |
+
## Files
|
| 66 |
|
| 67 |
+
- parquet/: cve.parquet, nvd_meta.parquet, kev.parquet, edges.parquet, preview.parquet (~1000 CVEs; see preview criteria)
|
| 68 |
+
- rag/: index.faiss, meta.parquet, mapping.parquet, vectors.npy (optional)
|
| 69 |
+
- docs/: LICENSES.md, LICENCE.md (CC0 legal code), NOTICE.md, INTEGRITY.txt, VALIDATION.json (if enabled), BUILD_MANIFEST.json
|
| 70 |
+
- demo/: OVX_quickstart.ipynb (offline quickstart)
|
| 71 |
|
| 72 |
+
## Validation and integrity
|
| 73 |
|
| 74 |
+
- VALIDATION.json includes: counts, cvss_v3_presence_ratio, cwe_presence_ratio, kev_cve_coverage_ratio, kev_cve_coverage_ratio_within_window, kev_rows_total_fetched, kev_rows_within_window, kev_within_window_over_global_ratio, rejected_cve_count, url_shape_failures, http_head_failures_hard, http_head_failures_flaky, dead_reference_links, duplicate_edges_dropped, snapshot_as_of
|
| 75 |
+
- URL checks (if present in this snapshot’s validation step) were executed conservatively with a single worker to reduce flakiness and rate limiting.
|
| 76 |
+
- INTEGRITY.txt: SHA-256 list of all files in this bundle. Verify locally:
|
| 77 |
+
- macOS:
|
| 78 |
+
```bash
|
| 79 |
+
shasum -a 256 -c docs/INTEGRITY.txt
|
| 80 |
+
```
|
| 81 |
+
- Linux:
|
| 82 |
+
```bash
|
| 83 |
+
sha256sum -c docs/INTEGRITY.txt
|
| 84 |
+
```
|
| 85 |
+
|
| 86 |
+
- Build metadata: see `docs/BUILD_MANIFEST.json` for snapshot parameters (timestamp, NVD window, tool/version info, internal commit/config). Provided for transparency; the build system is not included.
|
| 87 |
+
|
| 88 |
+
## RAG constraints
|
| 89 |
+
|
| 90 |
+
- Texts are PD/CC0-only (NVD short descriptions, KEV notes)
|
| 91 |
+
- meta.parquet: normalize=true, metric="IP", pinned model_name="BAAI/bge-small-en-v1.5" and dimension=384
|
| 92 |
+
- Retrieval requires the model to be present in local cache; no downloads
|
| 93 |
+
- If `rag/mapping.parquet` is present, it maps FAISS `row_index` → `cve_id` with columns: `row_index` (int32), `cve_id` (string)
|
| 94 |
|
| 95 |
## Preview parquet
|
| 96 |
|
| 97 |
+
- `parquet/preview.parquet` is a convenience subset for quick inspection.
|
| 98 |
- Selection: first 1000 rows by `cve_id` ordering from `parquet/cve.parquet`.
|
| 99 |
+
- Columns: `cve_id`, `summary`, `published_date`, `modified_date` (when available); otherwise falls back to a best-effort subset.
|
| 100 |
+
|
| 101 |
+
## Non-affiliation and license
|
| 102 |
+
|
| 103 |
+
- Not affiliated with NIST/NVD, CISA/KEV, or FIRST/EPSS
|
| 104 |
+
- NVD non-endorsement: "This product uses data from the NVD API but is not endorsed or certified by the NVD."
|
| 105 |
+
- Compiled artifact dedicated to the public domain under CC0 1.0 (see docs/LICENCE.md)
|
| 106 |
+
- Upstream sources: NVD (public domain), CISA KEV (CC0). Third‑party pages reached via reference URLs are governed by their own terms
|
| 107 |
+
|
| 108 |
+
## Start here
|
| 109 |
+
|
| 110 |
+
- Open [demo/OVX_quickstart.ipynb](demo/OVX_quickstart.ipynb) (no network calls)
|
| 111 |
+
- Or open [demo/OVX_quickstart.html](demo/OVX_quickstart.html) for a view-only quickstart
|
| 112 |
+
- Or query with DuckDB directly:
|
| 113 |
|
| 114 |
+
```
|
| 115 |
+
SELECT c.cve_id, m.cvss_v3_score, k.date_added
|
| 116 |
+
FROM read_parquet('parquet/kev.parquet') k
|
| 117 |
+
JOIN read_parquet('parquet/cve.parquet') c USING (cve_id)
|
| 118 |
+
LEFT JOIN read_parquet('parquet/nvd_meta.parquet') m USING (cve_id)
|
| 119 |
+
ORDER BY (m.cvss_v3_score IS NULL) ASC, m.cvss_v3_score DESC, k.date_added DESC
|
| 120 |
+
LIMIT 20;
|
| 121 |
+
```
|
| 122 |
|
| 123 |
+
### Top queries to try (DuckDB)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 124 |
|
| 125 |
+
```sql
|
| 126 |
+
-- Top KEV CVEs by CVSS
|
| 127 |
+
SELECT c.cve_id, m.cvss_v3_score, k.date_added
|
| 128 |
+
FROM read_parquet('parquet/kev.parquet') k
|
| 129 |
+
JOIN read_parquet('parquet/cve.parquet') c USING (cve_id)
|
| 130 |
+
LEFT JOIN read_parquet('parquet/nvd_meta.parquet') m USING (cve_id)
|
| 131 |
+
ORDER BY (m.cvss_v3_score IS NULL) ASC, m.cvss_v3_score DESC, k.date_added DESC
|
| 132 |
+
LIMIT 20;
|
| 133 |
|
| 134 |
+
-- Count malformed or missing CVSS
|
| 135 |
+
SELECT SUM(cvss_v3_score IS NULL) AS missing_cvss_v3, COUNT(*) AS total
|
| 136 |
+
FROM read_parquet('parquet/nvd_meta.parquet');
|
| 137 |
+
|
| 138 |
+
-- Top CWE categories by count
|
| 139 |
+
WITH u AS (
|
| 140 |
+
SELECT UNNEST(cwe_ids) AS cwe FROM read_parquet('parquet/nvd_meta.parquet')
|
| 141 |
+
)
|
| 142 |
+
SELECT cwe, COUNT(*) AS cnt
|
| 143 |
+
FROM u
|
| 144 |
+
GROUP BY cwe
|
| 145 |
+
ORDER BY cnt DESC
|
| 146 |
+
LIMIT 20;
|
| 147 |
+
|
| 148 |
+
-- References for a specific CVE
|
| 149 |
+
SELECT dst_id AS reference_url
|
| 150 |
+
FROM read_parquet('parquet/edges.parquet')
|
| 151 |
+
WHERE src_type='cve' AND src_id='CVE-2021-44228' AND edge_type='cve_ref_url'
|
| 152 |
+
ORDER BY reference_url;
|
| 153 |
+
```
|
| 154 |
+
|
| 155 |
+
## Validation notes
|
| 156 |
+
|
| 157 |
+
- Where URL reachability checks were included, they used a single worker by default and domain-specific pacing (e.g., stricter for `vuldb.com`). Counts of malformed URLs and network failures are summarized in `docs/VALIDATION.json`.
|
| 158 |
|
| 159 |
## Limitations
|
| 160 |
|
| 161 |
+
- Some CVEs may lack CVSS vectors/scores in the NVD window (nulls are expected).
|
| 162 |
+
- URL checks are conservative and may still include dead or redirected links; always verify with official sources.
|
| 163 |
+
- KEV rows are filtered to the NVD window by design; KEV counts reflect in-window coverage, not global totals.
|
| 164 |
+
|
| 165 |
+
## Scope and KEV alignment
|
| 166 |
+
|
| 167 |
+
- KEV is filtered to the same NVD window; only KEV CVEs that are also in the NVD window are included. Edges never reference out‑of‑window CVEs.
|
| 168 |
+
- Coverage metric naming: `kev_cve_coverage_ratio_within_window` reflects this alignment and is expected to be 1.0 by design. The legacy key `kev_cve_coverage_ratio` is retained and equals the within-window value.
|
| 169 |
+
- Global context ratio: `kev_within_window_over_global_ratio = kev_rows_within_window / kev_rows_total_fetched` (share of KEV entries that fall into this snapshot’s NVD window).
|
| 170 |
+
|
| 171 |
+
|
| 172 |
+
## Schemas (columns and types)
|
| 173 |
+
|
| 174 |
+
- parquet/cve.parquet
|
| 175 |
+
- cve_id: string
|
| 176 |
+
- summary: string
|
| 177 |
+
- description_hash: string
|
| 178 |
+
- published_date: timestamp[us, UTC]
|
| 179 |
+
- modified_date: timestamp[us, UTC]
|
| 180 |
+
- is_rejected: boolean
|
| 181 |
+
- source: string
|
| 182 |
+
- source_url: string
|
| 183 |
+
- retrieved_at: timestamp[us, UTC]
|
| 184 |
+
- source_record_hash: string
|
| 185 |
+
|
| 186 |
+
- parquet/nvd_meta.parquet
|
| 187 |
+
- cve_id: string
|
| 188 |
+
- cvss_v3_score: float64 (nullable)
|
| 189 |
+
- cvss_v3_vector: string (nullable)
|
| 190 |
+
- cvss_v2_score: float64 (nullable)
|
| 191 |
+
- cwe_ids: list<string>
|
| 192 |
+
- reference_urls: list<string>
|
| 193 |
+
- ref_tags: list<string>
|
| 194 |
+
- source: string
|
| 195 |
+
- source_url: string
|
| 196 |
+
- retrieved_at: timestamp[us, UTC]
|
| 197 |
+
- source_record_hash: string
|
| 198 |
+
|
| 199 |
+
- parquet/kev.parquet
|
| 200 |
+
- cve_id: string
|
| 201 |
+
- date_added: date32[day]
|
| 202 |
+
- notes: string (nullable)
|
| 203 |
+
- source: string
|
| 204 |
+
- source_url: string
|
| 205 |
+
- retrieved_at: timestamp[us, UTC]
|
| 206 |
+
- source_record_hash: string
|
| 207 |
+
|
| 208 |
+
- parquet/edges.parquet
|
| 209 |
+
- src_type: string
|
| 210 |
+
- src_id: string
|
| 211 |
+
- edge_type: string
|
| 212 |
+
- dst_type: string
|
| 213 |
+
- dst_id: string
|
| 214 |
+
- source: string
|
| 215 |
+
- source_url: string
|
| 216 |
+
- retrieved_at: timestamp[us, UTC]
|
| 217 |
+
|
| 218 |
+
- rag/meta.parquet
|
| 219 |
+
- model_name: string
|
| 220 |
+
- dim: int32
|
| 221 |
+
- normalize: boolean
|
| 222 |
+
- metric: string
|
| 223 |
+
- texts_count: int64
|
| 224 |
+
|
| 225 |
+
## Storage and performance notes
|
| 226 |
+
|
| 227 |
+
- Parquet compression: `snappy` (writer default).
|
| 228 |
+
- Disk footprint: varies by window; see your build output directory sizes to estimate download needs.
|
| 229 |
+
|
| 230 |
+
### Uniqueness rules
|
| 231 |
+
|
| 232 |
+
- Primary keys:
|
| 233 |
+
- `cve.parquet`: `cve_id`
|
| 234 |
+
- `nvd_meta.parquet`: `cve_id`
|
| 235 |
+
- `kev.parquet`: `cve_id`
|
| 236 |
+
- Edges composite uniqueness:
|
| 237 |
+
- Unique on (`src_type`, `src_id`, `edge_type`, `dst_type`, `dst_id`, `source`)
|
| 238 |
+
- Duplicates are dropped; see `duplicate_edges_dropped` in `docs/VALIDATION.json`.
|
| 239 |
+
|
| 240 |
+
## Citation
|
| 241 |
+
|
| 242 |
+
If you use this snapshot, please cite:
|
| 243 |
+
|
| 244 |
+
```
|
| 245 |
+
"CVE-KEV Snapshot (2025-10-29T13:51:37Z)", CC0-1.0, https://huggingface.co/datasets/NostromoHub/cve-kev-snapshot-90d-2025-10-29
|
| 246 |
+
```
|
| 247 |
|
| 248 |
## Usage
|
| 249 |
|
|
|
|
| 277 |
print(df.head())
|
| 278 |
```
|
| 279 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 280 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
demo/OVX_quickstart.html
ADDED
|
@@ -0,0 +1,425 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<!DOCTYPE html>
|
| 2 |
+
<html lang="en">
|
| 3 |
+
<head>
|
| 4 |
+
<meta charset="UTF-8" />
|
| 5 |
+
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
|
| 6 |
+
<title>CVE-KEV Snapshot — Offline Quickstart (HTML)</title>
|
| 7 |
+
<style>
|
| 8 |
+
body { font-family: -apple-system, BlinkMacSystemFont, Segoe UI, Roboto, Helvetica, Arial, sans-serif; margin: 24px; line-height: 1.45; }
|
| 9 |
+
h1, h2, h3 { margin-top: 1.2em; }
|
| 10 |
+
code, pre { background: #f6f8fa; padding: 2px 4px; border-radius: 4px; }
|
| 11 |
+
table { border-collapse: collapse; width: 100%; margin: 12px 0; }
|
| 12 |
+
th, td { text-align: left; border: 1px solid #e1e4e8; padding: 6px 8px; }
|
| 13 |
+
th { background: #fafbfc; }
|
| 14 |
+
.meta { color: #555; }
|
| 15 |
+
.links a { margin-right: 12px; }
|
| 16 |
+
.empty { color: #777; font-style: italic; }
|
| 17 |
+
</style>
|
| 18 |
+
<!-- This file is static. Values are substituted at build time. -->
|
| 19 |
+
</head>
|
| 20 |
+
<body>
|
| 21 |
+
<h1>CVE-KEV Snapshot — Offline Quickstart</h1>
|
| 22 |
+
<p class="meta">Snapshot as of (UTC): <strong>2025-10-29T13:51:37Z</strong></p>
|
| 23 |
+
<p class="meta">Total CVE rows: <strong>12307</strong> · Total KEV rows: <strong>28</strong></p>
|
| 24 |
+
<p class="links">
|
| 25 |
+
<a href="../docs/VALIDATION.json">Validation Report</a>
|
| 26 |
+
<a href="../docs/INTEGRITY.txt">Integrity Check</a>
|
| 27 |
+
<a href="../docs/BUILD_MANIFEST.json">Build Manifest</a>
|
| 28 |
+
</p>
|
| 29 |
+
|
| 30 |
+
<h2>Accuracy at a glance</h2>
|
| 31 |
+
<div><table><tbody><tr><th>cvss_v3_presence_ratio</th><td>0.760137</td></tr><tr><th>cwe_presence_ratio</th><td>0.827659</td></tr><tr><th>kev_cve_coverage_ratio_within_window</th><td>1.0</td></tr><tr><th>kev_rows_total_fetched</th><td>1451</td></tr><tr><th>kev_rows_within_window</th><td>28</td></tr><tr><th>kev_rows_filtered_out</th><td>1423</td></tr><tr><th>kev_within_window_over_global_ratio</th><td>0.019297</td></tr><tr><th>rejected_cve_count</th><td>103</td></tr><tr><th>url_shape_failures</th><td>0</td></tr><tr><th>http_head_failures_hard</th><td>744</td></tr><tr><th>http_head_failures_flaky</th><td>5487</td></tr><tr><th>dead_reference_links</th><td>6231</td></tr><tr><th>duplicate_edges_dropped</th><td>2027</td></tr></tbody></table></div>
|
| 32 |
+
<p class="meta">Notes: <code>http_head_failures_hard</code> are definitive HTTP errors (4xx/5xx); <code>http_head_failures_flaky</code> are timeouts or rate limiting. <code>dead_reference_links</code> equals the sum of these categories in this snapshot.</p>
|
| 33 |
+
|
| 34 |
+
<h2>Data previews</h2>
|
| 35 |
+
<h3>Top KEV CVEs by CVSS (max 20)</h3>
|
| 36 |
+
<div><table border="1" class="dataframe">
|
| 37 |
+
<thead>
|
| 38 |
+
<tr style="text-align: right;">
|
| 39 |
+
<th>cve_id</th>
|
| 40 |
+
<th>cvss_v3_score</th>
|
| 41 |
+
<th>date_added</th>
|
| 42 |
+
<th>notes</th>
|
| 43 |
+
</tr>
|
| 44 |
+
</thead>
|
| 45 |
+
<tbody>
|
| 46 |
+
<tr>
|
| 47 |
+
<td>CVE-2025-54253</td>
|
| 48 |
+
<td>10.0</td>
|
| 49 |
+
<td>2025-10-15</td>
|
| 50 |
+
<td>https://helpx.adobe.com/security/products/aem-forms/apsb25-82.html ; https://nvd.nist.gov/vuln/detail/CVE-2025-54253</td>
|
| 51 |
+
</tr>
|
| 52 |
+
<tr>
|
| 53 |
+
<td>CVE-2025-10035</td>
|
| 54 |
+
<td>10.0</td>
|
| 55 |
+
<td>2025-09-29</td>
|
| 56 |
+
<td>https://www.fortra.com/security/advisories/product-security/fi-2025-012 ; https://nvd.nist.gov/vuln/detail/CVE-2025-10035</td>
|
| 57 |
+
</tr>
|
| 58 |
+
<tr>
|
| 59 |
+
<td>CVE-2025-20333</td>
|
| 60 |
+
<td>9.9</td>
|
| 61 |
+
<td>2025-09-25</td>
|
| 62 |
+
<td>CISA Mitigation Instructions: https://www.cisa.gov/news-events/directives/ed-25-03-identify-and-mitigate-potential-compromise-cisco-devices ; https://www.cisa.gov/news-events/directives/supplemental-direction-ed-25-03-core-dump-and-hunt-instructions ; https://www.cisa.gov/eviction-strategies-tool/create-from-template ; https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_continued_attacks ; https://sec.cloudapps.cisco.com/security/center/private/resources/asa_ftd_continued_attacks#Details ; https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webvpn-z5xP8EUB ; https://nvd.nist.gov/vuln/detail/CVE-2025-20333</td>
|
| 63 |
+
</tr>
|
| 64 |
+
<tr>
|
| 65 |
+
<td>CVE-2025-59287</td>
|
| 66 |
+
<td>9.8</td>
|
| 67 |
+
<td>2025-10-24</td>
|
| 68 |
+
<td>https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59287 ; https://nvd.nist.gov/vuln/detail/CVE-2025-59287</td>
|
| 69 |
+
</tr>
|
| 70 |
+
<tr>
|
| 71 |
+
<td>CVE-2025-61932</td>
|
| 72 |
+
<td>9.8</td>
|
| 73 |
+
<td>2025-10-22</td>
|
| 74 |
+
<td>https://www.motex.co.jp/news/notice/2025/release251020/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-61932</td>
|
| 75 |
+
</tr>
|
| 76 |
+
<tr>
|
| 77 |
+
<td>CVE-2025-61882</td>
|
| 78 |
+
<td>9.8</td>
|
| 79 |
+
<td>2025-10-06</td>
|
| 80 |
+
<td>https://www.oracle.com/security-alerts/alert-cve-2025-61882.html ; https://nvd.nist.gov/vuln/detail/CVE-2025-61882</td>
|
| 81 |
+
</tr>
|
| 82 |
+
<tr>
|
| 83 |
+
<td>CVE-2025-10585</td>
|
| 84 |
+
<td>9.8</td>
|
| 85 |
+
<td>2025-09-23</td>
|
| 86 |
+
<td>https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_17.html ; https://nvd.nist.gov/vuln/detail/CVE-2025-10585</td>
|
| 87 |
+
</tr>
|
| 88 |
+
<tr>
|
| 89 |
+
<td>CVE-2025-57819</td>
|
| 90 |
+
<td>9.8</td>
|
| 91 |
+
<td>2025-08-29</td>
|
| 92 |
+
<td>https://github.com/FreePBX/security-reporting/security/advisories/GHSA-m42g-xg4c-5f3h ; https://nvd.nist.gov/vuln/detail/CVE-2025-57819</td>
|
| 93 |
+
</tr>
|
| 94 |
+
<tr>
|
| 95 |
+
<td>CVE-2025-7775</td>
|
| 96 |
+
<td>9.8</td>
|
| 97 |
+
<td>2025-08-26</td>
|
| 98 |
+
<td>https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694938 ; https://nvd.nist.gov/vuln/detail/CVE-2025-7775</td>
|
| 99 |
+
</tr>
|
| 100 |
+
<tr>
|
| 101 |
+
<td>CVE-2025-54948</td>
|
| 102 |
+
<td>9.4</td>
|
| 103 |
+
<td>2025-08-18</td>
|
| 104 |
+
<td>https://success.trendmicro.com/en-US/solution/KA-0020652 ; N/A ; https://nvd.nist.gov/vuln/detail/CVE-2025-54948</td>
|
| 105 |
+
</tr>
|
| 106 |
+
<tr>
|
| 107 |
+
<td>CVE-2025-6205</td>
|
| 108 |
+
<td>9.1</td>
|
| 109 |
+
<td>2025-10-28</td>
|
| 110 |
+
<td>https://www.3ds.com/trust-center/security/security-advisories/cve-2025-6205 ; https://nvd.nist.gov/vuln/detail/CVE-2025-6205</td>
|
| 111 |
+
</tr>
|
| 112 |
+
<tr>
|
| 113 |
+
<td>CVE-2025-54236</td>
|
| 114 |
+
<td>9.1</td>
|
| 115 |
+
<td>2025-10-24</td>
|
| 116 |
+
<td>https://experienceleague.adobe.com/en/docs/experience-cloud-kcs/kbarticles/ka-27397 ; https://nvd.nist.gov/vuln/detail/CVE-2025-54236</td>
|
| 117 |
+
</tr>
|
| 118 |
+
<tr>
|
| 119 |
+
<td>CVE-2025-53690</td>
|
| 120 |
+
<td>9.0</td>
|
| 121 |
+
<td>2025-09-04</td>
|
| 122 |
+
<td>https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1003865 ; https://nvd.nist.gov/vuln/detail/CVE-2025-53690</td>
|
| 123 |
+
</tr>
|
| 124 |
+
<tr>
|
| 125 |
+
<td>CVE-2025-21043</td>
|
| 126 |
+
<td>8.8</td>
|
| 127 |
+
<td>2025-10-02</td>
|
| 128 |
+
<td>https://security.samsungmobile.com/securityUpdate.smsb?year=2025&month=09 ; https://nvd.nist.gov/vuln/detail/CVE-2025-21043</td>
|
| 129 |
+
</tr>
|
| 130 |
+
<tr>
|
| 131 |
+
<td>CVE-2025-48543</td>
|
| 132 |
+
<td>8.8</td>
|
| 133 |
+
<td>2025-09-04</td>
|
| 134 |
+
<td>https://source.android.com/docs/security/bulletin/2025-09-01 ; https://nvd.nist.gov/vuln/detail/CVE-2025-48543</td>
|
| 135 |
+
</tr>
|
| 136 |
+
<tr>
|
| 137 |
+
<td>CVE-2025-43300</td>
|
| 138 |
+
<td>8.8</td>
|
| 139 |
+
<td>2025-08-21</td>
|
| 140 |
+
<td>https://support.apple.com/en-us/124925 ; https://support.apple.com/en-us/124926 ; https://support.apple.com/en-us/124927 ; https://support.apple.com/en-us/124928 ; https://support.apple.com/en-us/124929 ; https://nvd.nist.gov/vuln/detail/CVE-2025-43300</td>
|
| 141 |
+
</tr>
|
| 142 |
+
<tr>
|
| 143 |
+
<td>CVE-2025-8876</td>
|
| 144 |
+
<td>8.8</td>
|
| 145 |
+
<td>2025-08-13</td>
|
| 146 |
+
<td>https://status.n-able.com/2025/08/13/announcing-the-ga-of-n-central-2025-3-1/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-8876</td>
|
| 147 |
+
</tr>
|
| 148 |
+
<tr>
|
| 149 |
+
<td>CVE-2025-8088</td>
|
| 150 |
+
<td>8.8</td>
|
| 151 |
+
<td>2025-08-12</td>
|
| 152 |
+
<td>https://www.win-rar.com/singlenewsview.html?&L=0&tx_ttnews%5Btt_news%5D=283&cHash=a64b4a8f662d3639dec8d65f47bc93c5 ; https://nvd.nist.gov/vuln/detail/CVE-2025-8088</td>
|
| 153 |
+
</tr>
|
| 154 |
+
<tr>
|
| 155 |
+
<td>CVE-2025-6204</td>
|
| 156 |
+
<td>8.0</td>
|
| 157 |
+
<td>2025-10-28</td>
|
| 158 |
+
<td>https://www.3ds.com/trust-center/security/security-advisories/cve-2025-6204 ; https://nvd.nist.gov/vuln/detail/CVE-2025-6204</td>
|
| 159 |
+
</tr>
|
| 160 |
+
<tr>
|
| 161 |
+
<td>CVE-2025-59230</td>
|
| 162 |
+
<td>7.8</td>
|
| 163 |
+
<td>2025-10-14</td>
|
| 164 |
+
<td>https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59230 ; https://nvd.nist.gov/vuln/detail/CVE-2025-59230</td>
|
| 165 |
+
</tr>
|
| 166 |
+
</tbody>
|
| 167 |
+
</table></div>
|
| 168 |
+
|
| 169 |
+
<h3>CWE pivot (max 20)</h3>
|
| 170 |
+
<div><table border="1" class="dataframe">
|
| 171 |
+
<thead>
|
| 172 |
+
<tr style="text-align: right;">
|
| 173 |
+
<th>cwe</th>
|
| 174 |
+
<th>cnt</th>
|
| 175 |
+
</tr>
|
| 176 |
+
</thead>
|
| 177 |
+
<tbody>
|
| 178 |
+
<tr>
|
| 179 |
+
<td>CWE-79</td>
|
| 180 |
+
<td>1941</td>
|
| 181 |
+
</tr>
|
| 182 |
+
<tr>
|
| 183 |
+
<td>CWE-89</td>
|
| 184 |
+
<td>1179</td>
|
| 185 |
+
</tr>
|
| 186 |
+
<tr>
|
| 187 |
+
<td>CWE-74</td>
|
| 188 |
+
<td>686</td>
|
| 189 |
+
</tr>
|
| 190 |
+
<tr>
|
| 191 |
+
<td>CWE-862</td>
|
| 192 |
+
<td>462</td>
|
| 193 |
+
</tr>
|
| 194 |
+
<tr>
|
| 195 |
+
<td>CWE-94</td>
|
| 196 |
+
<td>411</td>
|
| 197 |
+
</tr>
|
| 198 |
+
<tr>
|
| 199 |
+
<td>CWE-284</td>
|
| 200 |
+
<td>348</td>
|
| 201 |
+
</tr>
|
| 202 |
+
<tr>
|
| 203 |
+
<td>CWE-352</td>
|
| 204 |
+
<td>332</td>
|
| 205 |
+
</tr>
|
| 206 |
+
<tr>
|
| 207 |
+
<td>CWE-78</td>
|
| 208 |
+
<td>321</td>
|
| 209 |
+
</tr>
|
| 210 |
+
<tr>
|
| 211 |
+
<td>CWE-121</td>
|
| 212 |
+
<td>296</td>
|
| 213 |
+
</tr>
|
| 214 |
+
<tr>
|
| 215 |
+
<td>CWE-434</td>
|
| 216 |
+
<td>276</td>
|
| 217 |
+
</tr>
|
| 218 |
+
<tr>
|
| 219 |
+
<td>CWE-22</td>
|
| 220 |
+
<td>264</td>
|
| 221 |
+
</tr>
|
| 222 |
+
<tr>
|
| 223 |
+
<td>CWE-119</td>
|
| 224 |
+
<td>242</td>
|
| 225 |
+
</tr>
|
| 226 |
+
<tr>
|
| 227 |
+
<td>CWE-77</td>
|
| 228 |
+
<td>239</td>
|
| 229 |
+
</tr>
|
| 230 |
+
<tr>
|
| 231 |
+
<td>CWE-200</td>
|
| 232 |
+
<td>229</td>
|
| 233 |
+
</tr>
|
| 234 |
+
<tr>
|
| 235 |
+
<td>CWE-416</td>
|
| 236 |
+
<td>218</td>
|
| 237 |
+
</tr>
|
| 238 |
+
<tr>
|
| 239 |
+
<td>CWE-125</td>
|
| 240 |
+
<td>205</td>
|
| 241 |
+
</tr>
|
| 242 |
+
<tr>
|
| 243 |
+
<td>CWE-787</td>
|
| 244 |
+
<td>192</td>
|
| 245 |
+
</tr>
|
| 246 |
+
<tr>
|
| 247 |
+
<td>CWE-20</td>
|
| 248 |
+
<td>171</td>
|
| 249 |
+
</tr>
|
| 250 |
+
<tr>
|
| 251 |
+
<td>CWE-502</td>
|
| 252 |
+
<td>169</td>
|
| 253 |
+
</tr>
|
| 254 |
+
<tr>
|
| 255 |
+
<td>CWE-918</td>
|
| 256 |
+
<td>167</td>
|
| 257 |
+
</tr>
|
| 258 |
+
</tbody>
|
| 259 |
+
</table></div>
|
| 260 |
+
|
| 261 |
+
<h3>Citations for a CVE (sample)</h3>
|
| 262 |
+
<div><table border="1" class="dataframe">
|
| 263 |
+
<thead>
|
| 264 |
+
<tr style="text-align: right;">
|
| 265 |
+
<th>cve_id</th>
|
| 266 |
+
<th>reference_url</th>
|
| 267 |
+
</tr>
|
| 268 |
+
</thead>
|
| 269 |
+
<tbody>
|
| 270 |
+
<tr>
|
| 271 |
+
<td>CVE-2025-54589</td>
|
| 272 |
+
<td>https://github.com/9001/copyparty/commit/a8705e611d05eeb22be5d3d7d9ab5c020fe54c62</td>
|
| 273 |
+
</tr>
|
| 274 |
+
<tr>
|
| 275 |
+
<td>CVE-2025-54589</td>
|
| 276 |
+
<td>https://github.com/9001/copyparty/releases/tag/v1.18.7</td>
|
| 277 |
+
</tr>
|
| 278 |
+
<tr>
|
| 279 |
+
<td>CVE-2025-54589</td>
|
| 280 |
+
<td>https://github.com/9001/copyparty/security/advisories/GHSA-8mx2-rjh8-q3jq</td>
|
| 281 |
+
</tr>
|
| 282 |
+
<tr>
|
| 283 |
+
<td>CVE-2025-7738</td>
|
| 284 |
+
<td>https://access.redhat.com/errata/RHSA-2025:12772</td>
|
| 285 |
+
</tr>
|
| 286 |
+
<tr>
|
| 287 |
+
<td>CVE-2025-7738</td>
|
| 288 |
+
<td>https://access.redhat.com/security/cve/CVE-2025-7738</td>
|
| 289 |
+
</tr>
|
| 290 |
+
<tr>
|
| 291 |
+
<td>CVE-2025-7738</td>
|
| 292 |
+
<td>https://bugzilla.redhat.com/show_bug.cgi?id=2381589</td>
|
| 293 |
+
</tr>
|
| 294 |
+
<tr>
|
| 295 |
+
<td>CVE-2025-8407</td>
|
| 296 |
+
<td>https://code-projects.org/</td>
|
| 297 |
+
</tr>
|
| 298 |
+
<tr>
|
| 299 |
+
<td>CVE-2025-8407</td>
|
| 300 |
+
<td>https://github.com/wllovemy/cve/issues/3</td>
|
| 301 |
+
</tr>
|
| 302 |
+
<tr>
|
| 303 |
+
<td>CVE-2025-8407</td>
|
| 304 |
+
<td>https://vuldb.com/?ctiid.318395</td>
|
| 305 |
+
</tr>
|
| 306 |
+
<tr>
|
| 307 |
+
<td>CVE-2025-8407</td>
|
| 308 |
+
<td>https://vuldb.com/?id.318395</td>
|
| 309 |
+
</tr>
|
| 310 |
+
<tr>
|
| 311 |
+
<td>CVE-2025-8407</td>
|
| 312 |
+
<td>https://vuldb.com/?submit.624009</td>
|
| 313 |
+
</tr>
|
| 314 |
+
<tr>
|
| 315 |
+
<td>CVE-2011-10008</td>
|
| 316 |
+
<td>https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/mplayer_m3u_bof.rb</td>
|
| 317 |
+
</tr>
|
| 318 |
+
<tr>
|
| 319 |
+
<td>CVE-2011-10008</td>
|
| 320 |
+
<td>https://www.exploit-db.com/exploits/17013</td>
|
| 321 |
+
</tr>
|
| 322 |
+
<tr>
|
| 323 |
+
<td>CVE-2011-10008</td>
|
| 324 |
+
<td>https://www.vulncheck.com/advisories/mplayer-lite-r33064-m3u-stack-based-buffer-overflow</td>
|
| 325 |
+
</tr>
|
| 326 |
+
<tr>
|
| 327 |
+
<td>CVE-2012-10021</td>
|
| 328 |
+
<td>https://forums.dlink.com/index.php?topic=51923.0</td>
|
| 329 |
+
</tr>
|
| 330 |
+
<tr>
|
| 331 |
+
<td>CVE-2012-10021</td>
|
| 332 |
+
<td>https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/dlink_dir605l_captcha_bof.rb</td>
|
| 333 |
+
</tr>
|
| 334 |
+
<tr>
|
| 335 |
+
<td>CVE-2012-10021</td>
|
| 336 |
+
<td>https://web.archive.org/web/20121012062554/http://www.devttys0.com/2012/10/exploiting-a-mips-stack-overflow/</td>
|
| 337 |
+
</tr>
|
| 338 |
+
<tr>
|
| 339 |
+
<td>CVE-2012-10021</td>
|
| 340 |
+
<td>https://www.exploit-db.com/exploits/29127</td>
|
| 341 |
+
</tr>
|
| 342 |
+
<tr>
|
| 343 |
+
<td>CVE-2012-10021</td>
|
| 344 |
+
<td>https://www.vulncheck.com/advisories/dlink-dir605l-captcha-handling-stack-based-buffer-overflow</td>
|
| 345 |
+
</tr>
|
| 346 |
+
<tr>
|
| 347 |
+
<td>CVE-2013-10033</td>
|
| 348 |
+
<td>https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/kimai_sqli.rb</td>
|
| 349 |
+
</tr>
|
| 350 |
+
</tbody>
|
| 351 |
+
</table></div>
|
| 352 |
+
|
| 353 |
+
<h3>Provenance sample</h3>
|
| 354 |
+
<div><table border="1" class="dataframe">
|
| 355 |
+
<thead>
|
| 356 |
+
<tr style="text-align: right;">
|
| 357 |
+
<th>cve_id</th>
|
| 358 |
+
<th>source</th>
|
| 359 |
+
<th>source_url</th>
|
| 360 |
+
<th>retrieved_at</th>
|
| 361 |
+
<th>source_record_hash</th>
|
| 362 |
+
</tr>
|
| 363 |
+
</thead>
|
| 364 |
+
<tbody>
|
| 365 |
+
<tr>
|
| 366 |
+
<td>CVE-2005-10004</td>
|
| 367 |
+
<td>nvd</td>
|
| 368 |
+
<td>https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=2000</td>
|
| 369 |
+
<td>2025-10-29 06:52:01.759408-07:00</td>
|
| 370 |
+
<td>2a55c362bb75b1cf2ccee02b7ac3b31a11e1e546ad68e5fc28f0cd656375de41</td>
|
| 371 |
+
</tr>
|
| 372 |
+
<tr>
|
| 373 |
+
<td>CVE-2008-20001</td>
|
| 374 |
+
<td>nvd</td>
|
| 375 |
+
<td>https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=2000</td>
|
| 376 |
+
<td>2025-10-29 06:52:01.759408-07:00</td>
|
| 377 |
+
<td>d95f6a12b98c9caebea1c431ba26e4a8b8b77711cd94eccd7abc43a9ec39aa94</td>
|
| 378 |
+
</tr>
|
| 379 |
+
<tr>
|
| 380 |
+
<td>CVE-2009-10005</td>
|
| 381 |
+
<td>nvd</td>
|
| 382 |
+
<td>https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=2000</td>
|
| 383 |
+
<td>2025-10-29 06:52:01.759408-07:00</td>
|
| 384 |
+
<td>a40b9fda78392a9207ebb108cfcc38f34ecca7f4028b4d98f96abbba244b48f4</td>
|
| 385 |
+
</tr>
|
| 386 |
+
<tr>
|
| 387 |
+
<td>CVE-2009-10006</td>
|
| 388 |
+
<td>nvd</td>
|
| 389 |
+
<td>https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=2000</td>
|
| 390 |
+
<td>2025-10-29 06:52:01.759408-07:00</td>
|
| 391 |
+
<td>a06f93253a5961c5dcdfafc518d6f70b1b57faef5f20cdd9e0368f927f6e5c23</td>
|
| 392 |
+
</tr>
|
| 393 |
+
<tr>
|
| 394 |
+
<td>CVE-2009-20002</td>
|
| 395 |
+
<td>nvd</td>
|
| 396 |
+
<td>https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=2000</td>
|
| 397 |
+
<td>2025-10-29 06:52:01.759408-07:00</td>
|
| 398 |
+
<td>a0293a64b504ab0094417c0feeb192786b5d5c857b944f287f28fa6ab8e28453</td>
|
| 399 |
+
</tr>
|
| 400 |
+
</tbody>
|
| 401 |
+
</table></div>
|
| 402 |
+
|
| 403 |
+
<h2>RAG configuration</h2>
|
| 404 |
+
<p>model_name=BAAI/bge-small-en-v1.5, dim=384, normalize=True, metric=IP, texts_count=12335</p>
|
| 405 |
+
<p class="meta">Retrieval requires the model to be present in the local cache; no downloads are attempted.</p>
|
| 406 |
+
|
| 407 |
+
<h2>Limits & assumptions</h2>
|
| 408 |
+
<ul>
|
| 409 |
+
<li>Point-in-time snapshot; no update cadence.</li>
|
| 410 |
+
<li>Upstream truth: reflects NVD (PD) and CISA KEV (CC0).</li>
|
| 411 |
+
<li>KEV is filtered to the same NVD window; only KEV CVEs that are also in the NVD window are included. Edges never reference out‑of‑window CVEs.</li>
|
| 412 |
+
<li>URL checks are bounded; timeouts possible.</li>
|
| 413 |
+
<li>Texts for RAG are PD/CC0-only.</li>
|
| 414 |
+
</ul>
|
| 415 |
+
|
| 416 |
+
<h2>Links</h2>
|
| 417 |
+
<ul>
|
| 418 |
+
<li><a href="OVX_quickstart.ipynb">OVX_quickstart.ipynb</a></li>
|
| 419 |
+
<li><a href="../parquet/">parquet/</a></li>
|
| 420 |
+
<li><a href="../docs/">docs/</a></li>
|
| 421 |
+
</ul>
|
| 422 |
+
</body>
|
| 423 |
+
</html>
|
| 424 |
+
|
| 425 |
+
|
demo/OVX_quickstart.ipynb
ADDED
|
@@ -0,0 +1,485 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"cells": [
|
| 3 |
+
{
|
| 4 |
+
"cell_type": "markdown",
|
| 5 |
+
"metadata": {},
|
| 6 |
+
"source": [
|
| 7 |
+
"# CVE-KEV Snapshot — Offline Quickstart\n",
|
| 8 |
+
"\n",
|
| 9 |
+
"Audience: security ML/RAG practitioners and analysts. Runs fully offline; no network calls.\n",
|
| 10 |
+
"\n",
|
| 11 |
+
"- What this does:\n",
|
| 12 |
+
" - Loads Parquet tables and shows quick triage and retrieval examples\n",
|
| 13 |
+
" - Surfaces integrity and validation signals (accuracy)\n",
|
| 14 |
+
" - Skips RAG if the embedding model isn't cached locally\n"
|
| 15 |
+
]
|
| 16 |
+
},
|
| 17 |
+
{
|
| 18 |
+
"cell_type": "code",
|
| 19 |
+
"execution_count": null,
|
| 20 |
+
"metadata": {},
|
| 21 |
+
"outputs": [],
|
| 22 |
+
"source": [
|
| 23 |
+
"HF_DATASET_URL = 'https://huggingface.co/datasets/NostromoHub/cve-kev-snapshot-90d-2025-09-04/resolve/main' # used only in hosted runtimes for optional installs\n"
|
| 24 |
+
]
|
| 25 |
+
},
|
| 26 |
+
{
|
| 27 |
+
"cell_type": "markdown",
|
| 28 |
+
"metadata": {},
|
| 29 |
+
"source": [
|
| 30 |
+
"Running in Colab or Kaggle?\n",
|
| 31 |
+
"\n",
|
| 32 |
+
"- This offline notebook does not install dependencies by default.\n",
|
| 33 |
+
"- If you're in an online runtime (Colab/Kaggle), you can opt-in to install deps below.\n",
|
| 34 |
+
"- Local/offline users should pre-install packages (see demo/requirements-colab.txt).\n"
|
| 35 |
+
]
|
| 36 |
+
},
|
| 37 |
+
{
|
| 38 |
+
"cell_type": "code",
|
| 39 |
+
"execution_count": null,
|
| 40 |
+
"metadata": {},
|
| 41 |
+
"outputs": [],
|
| 42 |
+
"source": [
|
| 43 |
+
"# Optional: install dependencies when running in Colab/Kaggle (online only)\n",
|
| 44 |
+
"# By default, offline users should pre-install packages and skip this cell.\n",
|
| 45 |
+
"try:\n",
|
| 46 |
+
" import os\n",
|
| 47 |
+
" IN_COLAB = 'COLAB_GPU' in os.environ or 'COLAB_RELEASE_TAG' in os.environ\n",
|
| 48 |
+
" IN_KAGGLE = 'KAGGLE_URL_BASE' in os.environ\n",
|
| 49 |
+
" if IN_COLAB or IN_KAGGLE:\n",
|
| 50 |
+
" if not HF_DATASET_URL:\n",
|
| 51 |
+
" raise RuntimeError('HF_DATASET_URL is empty; set it at the top of the notebook to enable online install.')\n",
|
| 52 |
+
" url = HF_DATASET_URL.rstrip('/') + '/demo/requirements-colab.txt'\n",
|
| 53 |
+
" print('Detected hosted runtime. Installing from:', url)\n",
|
| 54 |
+
" import subprocess, sys\n",
|
| 55 |
+
" subprocess.check_call([sys.executable, '-m', 'pip', 'install', '-r', url])\n",
|
| 56 |
+
" else:\n",
|
| 57 |
+
" print('Hosted runtime not detected; skipping online install.')\n",
|
| 58 |
+
"except Exception as e:\n",
|
| 59 |
+
" print('Dependency install skipped or failed:', e)\n"
|
| 60 |
+
]
|
| 61 |
+
},
|
| 62 |
+
{
|
| 63 |
+
"cell_type": "code",
|
| 64 |
+
"execution_count": null,
|
| 65 |
+
"metadata": {},
|
| 66 |
+
"outputs": [],
|
| 67 |
+
"source": [
|
| 68 |
+
"# Optional: dependency check (offline-safe). Set ENABLE_AUTO_INSTALL=True to pip install.\n",
|
| 69 |
+
"import importlib, sys, subprocess\n",
|
| 70 |
+
"\n",
|
| 71 |
+
"ENABLE_AUTO_INSTALL = False # change to True to auto-install missing deps\n",
|
| 72 |
+
"REQUIRED_PACKAGES = [\"duckdb\", \"pandas\", \"pyarrow\"]\n",
|
| 73 |
+
"missing = []\n",
|
| 74 |
+
"for pkg in REQUIRED_PACKAGES:\n",
|
| 75 |
+
" try:\n",
|
| 76 |
+
" importlib.import_module(pkg)\n",
|
| 77 |
+
" except Exception:\n",
|
| 78 |
+
" missing.append(pkg)\n",
|
| 79 |
+
"\n",
|
| 80 |
+
"if missing:\n",
|
| 81 |
+
" print(\"Missing packages:\", missing)\n",
|
| 82 |
+
" if ENABLE_AUTO_INSTALL:\n",
|
| 83 |
+
" try:\n",
|
| 84 |
+
" subprocess.check_call([sys.executable, \"-m\", \"pip\", \"install\", *missing])\n",
|
| 85 |
+
" # Re-validate imports\n",
|
| 86 |
+
" for pkg in list(missing):\n",
|
| 87 |
+
" importlib.import_module(pkg)\n",
|
| 88 |
+
" print(\"Installed successfully.\")\n",
|
| 89 |
+
" except Exception as install_err:\n",
|
| 90 |
+
" print(\"Auto-install failed:\", install_err)\n",
|
| 91 |
+
" print(\"Run manually:\", \"pip install \" + \" \".join(missing))\n",
|
| 92 |
+
" else:\n",
|
| 93 |
+
" print(\"Set ENABLE_AUTO_INSTALL=True above or run:\")\n",
|
| 94 |
+
" print(\"pip install \" + \" \".join(missing))\n",
|
| 95 |
+
"else:\n",
|
| 96 |
+
" print(\"All required packages are present.\")\n"
|
| 97 |
+
]
|
| 98 |
+
},
|
| 99 |
+
{
|
| 100 |
+
"cell_type": "markdown",
|
| 101 |
+
"metadata": {},
|
| 102 |
+
"source": [
|
| 103 |
+
"Artifacts (click to view): [Validation Report](../docs/VALIDATION.json) · [Integrity Check](../docs/INTEGRITY.txt) · [Build Manifest](../docs/BUILD_MANIFEST.json)\n"
|
| 104 |
+
]
|
| 105 |
+
},
|
| 106 |
+
{
|
| 107 |
+
"cell_type": "code",
|
| 108 |
+
"execution_count": null,
|
| 109 |
+
"metadata": {},
|
| 110 |
+
"outputs": [],
|
| 111 |
+
"source": [
|
| 112 |
+
"from pathlib import Path\n",
|
| 113 |
+
"import json\n",
|
| 114 |
+
"\n",
|
| 115 |
+
"BASE = Path('..').resolve()\n",
|
| 116 |
+
"PARQ = BASE / 'parquet'\n",
|
| 117 |
+
"DOCS = BASE / 'docs'\n",
|
| 118 |
+
"RAG = BASE / 'rag'\n",
|
| 119 |
+
"\n",
|
| 120 |
+
"assert PARQ.exists() and DOCS.exists(), 'Missing required directories. Ensure you are running the notebook from the snapshot \"demo\" directory.'\n"
|
| 121 |
+
]
|
| 122 |
+
},
|
| 123 |
+
{
|
| 124 |
+
"cell_type": "code",
|
| 125 |
+
"execution_count": null,
|
| 126 |
+
"metadata": {},
|
| 127 |
+
"outputs": [],
|
| 128 |
+
"source": [
|
| 129 |
+
"# Snapshot metadata\n",
|
| 130 |
+
"manifest = json.loads((DOCS / 'BUILD_MANIFEST.json').read_text())\n",
|
| 131 |
+
"print('snapshot_as_of:', manifest.get('snapshot_as_of'))\n",
|
| 132 |
+
"# Prefer manifest-provided window; fallback to parsing README if absent\n",
|
| 133 |
+
"window_days = manifest.get('nvd_window_days')\n",
|
| 134 |
+
"if window_days is None:\n",
|
| 135 |
+
" try:\n",
|
| 136 |
+
" txt = (BASE / 'README.md').read_text(encoding='utf-8')\n",
|
| 137 |
+
" marker = 'NVD window (days): '\n",
|
| 138 |
+
" i = txt.find(marker)\n",
|
| 139 |
+
" if i != -1:\n",
|
| 140 |
+
" j = i + len(marker)\n",
|
| 141 |
+
" k = j\n",
|
| 142 |
+
" while k < len(txt) and txt[k].isdigit():\n",
|
| 143 |
+
" k += 1\n",
|
| 144 |
+
" window_days = int(txt[j:k]) if k > j else None\n",
|
| 145 |
+
" except Exception:\n",
|
| 146 |
+
" window_days = None\n",
|
| 147 |
+
"print('nvd_window_days:', window_days)\n",
|
| 148 |
+
"print('model:', manifest.get('model_name'), 'dim:', manifest.get('model_dim'))\n"
|
| 149 |
+
]
|
| 150 |
+
},
|
| 151 |
+
{
|
| 152 |
+
"cell_type": "code",
|
| 153 |
+
"execution_count": null,
|
| 154 |
+
"metadata": {},
|
| 155 |
+
"outputs": [],
|
| 156 |
+
"source": [
|
| 157 |
+
"# Integrity spot-check (first 5 entries)\n",
|
| 158 |
+
"import hashlib\n",
|
| 159 |
+
"\n",
|
| 160 |
+
"def sha256(path: Path) -> str:\n",
|
| 161 |
+
" h = hashlib.sha256()\n",
|
| 162 |
+
" with path.open('rb') as f:\n",
|
| 163 |
+
" for chunk in iter(lambda: f.read(1024*1024), b''):\n",
|
| 164 |
+
" h.update(chunk)\n",
|
| 165 |
+
" return h.hexdigest()\n",
|
| 166 |
+
"\n",
|
| 167 |
+
"lines = (DOCS / 'INTEGRITY.txt').read_text().splitlines()\n",
|
| 168 |
+
"# Parse lines robustly on whitespace: '<digest> <relative_path>'\n",
|
| 169 |
+
"pairs = []\n",
|
| 170 |
+
"for ln in lines:\n",
|
| 171 |
+
" if not ln.strip():\n",
|
| 172 |
+
" continue\n",
|
| 173 |
+
" parts = ln.split()\n",
|
| 174 |
+
" digest_expected, rel = parts[0], ' '.join(parts[1:])\n",
|
| 175 |
+
" pairs.append((rel, digest_expected))\n",
|
| 176 |
+
"\n",
|
| 177 |
+
"subset = [rel for rel, _ in pairs[:5]]\n",
|
| 178 |
+
"issues = []\n",
|
| 179 |
+
"for rel in subset:\n",
|
| 180 |
+
" digest_expected = next(d for r, d in pairs if r == rel)\n",
|
| 181 |
+
" actual = sha256(BASE / rel)\n",
|
| 182 |
+
" if actual != digest_expected:\n",
|
| 183 |
+
" issues.append(rel)\n",
|
| 184 |
+
"print('integrity_spotcheck_mismatches:', issues)\n"
|
| 185 |
+
]
|
| 186 |
+
},
|
| 187 |
+
{
|
| 188 |
+
"cell_type": "code",
|
| 189 |
+
"execution_count": null,
|
| 190 |
+
"metadata": {},
|
| 191 |
+
"outputs": [],
|
| 192 |
+
"source": [
|
| 193 |
+
"# Load with DuckDB; fallback to pandas if needed\n",
|
| 194 |
+
"try:\n",
|
| 195 |
+
" import duckdb as dd\n",
|
| 196 |
+
" con = dd.connect()\n",
|
| 197 |
+
" con.execute('PRAGMA threads=4')\n",
|
| 198 |
+
" engine = 'duckdb'\n",
|
| 199 |
+
"except Exception as e:\n",
|
| 200 |
+
" import pandas as pd\n",
|
| 201 |
+
" engine = 'pandas'\n",
|
| 202 |
+
" print('DuckDB unavailable, using pandas:', e)\n",
|
| 203 |
+
"\n",
|
| 204 |
+
"if engine == 'duckdb':\n",
|
| 205 |
+
" total_cve = con.execute(\"SELECT COUNT(*) FROM read_parquet(?)\", [str(PARQ/'cve.parquet')]).fetchone()[0]\n",
|
| 206 |
+
" total_kev = con.execute(\"SELECT COUNT(*) FROM read_parquet(?)\", [str(PARQ/'kev.parquet')]).fetchone()[0]\n",
|
| 207 |
+
"else:\n",
|
| 208 |
+
" import pandas as pd\n",
|
| 209 |
+
" total_cve = len(pd.read_parquet(PARQ/'cve.parquet'))\n",
|
| 210 |
+
" total_kev = len(pd.read_parquet(PARQ/'kev.parquet'))\n",
|
| 211 |
+
"print('rows:', {'cve': total_cve, 'kev': total_kev})\n"
|
| 212 |
+
]
|
| 213 |
+
},
|
| 214 |
+
{
|
| 215 |
+
"cell_type": "code",
|
| 216 |
+
"execution_count": null,
|
| 217 |
+
"metadata": {},
|
| 218 |
+
"outputs": [],
|
| 219 |
+
"source": [
|
| 220 |
+
"# Accuracy panel\n",
|
| 221 |
+
"import os\n",
|
| 222 |
+
"val_path = DOCS / 'VALIDATION.json'\n",
|
| 223 |
+
"if val_path.exists():\n",
|
| 224 |
+
" validation = json.loads(val_path.read_text())\n",
|
| 225 |
+
" keys = [\n",
|
| 226 |
+
" 'counts',\n",
|
| 227 |
+
" 'cvss_v3_presence_ratio',\n",
|
| 228 |
+
" 'cwe_presence_ratio',\n",
|
| 229 |
+
" 'kev_cve_coverage_ratio',\n",
|
| 230 |
+
" 'kev_cve_coverage_ratio_within_window',\n",
|
| 231 |
+
" 'kev_rows_total_fetched',\n",
|
| 232 |
+
" 'kev_rows_within_window',\n",
|
| 233 |
+
" 'kev_rows_filtered_out',\n",
|
| 234 |
+
" 'kev_within_window_over_global_ratio',\n",
|
| 235 |
+
" 'url_shape_failures',\n",
|
| 236 |
+
" 'http_head_failures_hard',\n",
|
| 237 |
+
" 'http_head_failures_flaky',\n",
|
| 238 |
+
" 'dead_reference_links',\n",
|
| 239 |
+
" 'duplicate_edges_dropped',\n",
|
| 240 |
+
" 'snapshot_as_of',\n",
|
| 241 |
+
" ]\n",
|
| 242 |
+
" summary = {k: validation.get(k) for k in keys}\n",
|
| 243 |
+
" print(summary)\n",
|
| 244 |
+
"else:\n",
|
| 245 |
+
" # Minimal local signal if validation omitted\n",
|
| 246 |
+
" if engine == 'duckdb':\n",
|
| 247 |
+
" cvss_ratio = con.execute(\"\"\"\n",
|
| 248 |
+
" WITH t AS (\n",
|
| 249 |
+
" SELECT COUNT(*) AS n, SUM(CASE WHEN cvss_v3_score IS NOT NULL THEN 1 ELSE 0 END) AS v\n",
|
| 250 |
+
" FROM read_parquet(?)\n",
|
| 251 |
+
" ) SELECT CAST(v AS DOUBLE)/n FROM t\n",
|
| 252 |
+
" \"\"\", [str(PARQ/'nvd_meta.parquet')]).fetchone()[0]\n",
|
| 253 |
+
" else:\n",
|
| 254 |
+
" import pandas as pd\n",
|
| 255 |
+
" m = pd.read_parquet(PARQ/'nvd_meta.parquet')\n",
|
| 256 |
+
" cvss_ratio = float((m['cvss_v3_score'].notnull()).mean())\n",
|
| 257 |
+
" print({'cvss_v3_presence_ratio': cvss_ratio})\n"
|
| 258 |
+
]
|
| 259 |
+
},
|
| 260 |
+
{
|
| 261 |
+
"cell_type": "code",
|
| 262 |
+
"execution_count": null,
|
| 263 |
+
"metadata": {},
|
| 264 |
+
"outputs": [],
|
| 265 |
+
"source": [
|
| 266 |
+
"# Provenance proof (sample rows)\n",
|
| 267 |
+
"if engine == 'duckdb':\n",
|
| 268 |
+
" df = con.execute(\"\"\"\n",
|
| 269 |
+
" SELECT c.cve_id, c.source, c.source_url, c.retrieved_at, c.source_record_hash\n",
|
| 270 |
+
" FROM read_parquet(?) c\n",
|
| 271 |
+
" ORDER BY c.cve_id\n",
|
| 272 |
+
" LIMIT 5\n",
|
| 273 |
+
" \"\"\", [str(PARQ/'cve.parquet')]).df()\n",
|
| 274 |
+
"else:\n",
|
| 275 |
+
" import pandas as pd\n",
|
| 276 |
+
" c = pd.read_parquet(PARQ/'cve.parquet', columns=['cve_id','source','source_url','retrieved_at','source_record_hash'])\n",
|
| 277 |
+
" df = c.sort_values('cve_id').head(5)\n",
|
| 278 |
+
"from IPython.display import display\n",
|
| 279 |
+
"display(df)\n"
|
| 280 |
+
]
|
| 281 |
+
},
|
| 282 |
+
{
|
| 283 |
+
"cell_type": "code",
|
| 284 |
+
"execution_count": null,
|
| 285 |
+
"metadata": {},
|
| 286 |
+
"outputs": [],
|
| 287 |
+
"source": [
|
| 288 |
+
"# KEV triage (top 20 by CVSS)\n",
|
| 289 |
+
"if engine == 'duckdb':\n",
|
| 290 |
+
" df = con.execute(\"\"\"\n",
|
| 291 |
+
" SELECT c.cve_id, m.cvss_v3_score, k.date_added, k.notes\n",
|
| 292 |
+
" FROM read_parquet(?) k\n",
|
| 293 |
+
" JOIN read_parquet(?) c ON c.cve_id = k.cve_id\n",
|
| 294 |
+
" LEFT JOIN read_parquet(?) m ON m.cve_id = c.cve_id\n",
|
| 295 |
+
" ORDER BY (m.cvss_v3_score IS NULL) ASC, m.cvss_v3_score DESC, k.date_added DESC\n",
|
| 296 |
+
" LIMIT 20\n",
|
| 297 |
+
" \"\"\", [str(PARQ/'kev.parquet'), str(PARQ/'cve.parquet'), str(PARQ/'nvd_meta.parquet')]).df()\n",
|
| 298 |
+
"else:\n",
|
| 299 |
+
" import pandas as pd\n",
|
| 300 |
+
" k = pd.read_parquet(PARQ/'kev.parquet')\n",
|
| 301 |
+
" c = pd.read_parquet(PARQ/'cve.parquet')\n",
|
| 302 |
+
" m = pd.read_parquet(PARQ/'nvd_meta.parquet')\n",
|
| 303 |
+
" df = k.merge(c, on='cve_id').merge(m[['cve_id','cvss_v3_score']], on='cve_id', how='left')\n",
|
| 304 |
+
" df = df.sort_values(['cvss_v3_score','date_added'], ascending=[False, False]).head(20)\n",
|
| 305 |
+
"from IPython.display import display\n",
|
| 306 |
+
"# Export first CVE id for downstream default in citations\n",
|
| 307 |
+
"try:\n",
|
| 308 |
+
" DEFAULT_CVE_FOR_CITATIONS = df['cve_id'].iloc[0] if len(df) else None\n",
|
| 309 |
+
"except Exception:\n",
|
| 310 |
+
" DEFAULT_CVE_FOR_CITATIONS = None\n",
|
| 311 |
+
"display(df)\n"
|
| 312 |
+
]
|
| 313 |
+
},
|
| 314 |
+
{
|
| 315 |
+
"cell_type": "code",
|
| 316 |
+
"execution_count": null,
|
| 317 |
+
"metadata": {},
|
| 318 |
+
"outputs": [],
|
| 319 |
+
"source": [
|
| 320 |
+
"# CWE pivot (top 20)\n",
|
| 321 |
+
"if engine == 'duckdb':\n",
|
| 322 |
+
" df = con.execute(\"\"\"\n",
|
| 323 |
+
" SELECT u.cwe, COUNT(*) AS cnt\n",
|
| 324 |
+
" FROM read_parquet(?) t, UNNEST(t.cwe_ids) AS u(cwe)\n",
|
| 325 |
+
" GROUP BY 1\n",
|
| 326 |
+
" ORDER BY cnt DESC\n",
|
| 327 |
+
" LIMIT 20\n",
|
| 328 |
+
" \"\"\", [str(PARQ/'nvd_meta.parquet')]).df()\n",
|
| 329 |
+
"else:\n",
|
| 330 |
+
" import pandas as pd\n",
|
| 331 |
+
" m = pd.read_parquet(PARQ/'nvd_meta.parquet')\n",
|
| 332 |
+
" rows = []\n",
|
| 333 |
+
" for _, r in m.iterrows():\n",
|
| 334 |
+
" for c in (r['cwe_ids'] or []):\n",
|
| 335 |
+
" rows.append(c)\n",
|
| 336 |
+
" import collections\n",
|
| 337 |
+
" cc = collections.Counter(rows)\n",
|
| 338 |
+
" df = pd.DataFrame({'cwe': list(cc.keys()), 'cnt': list(cc.values())}).sort_values('cnt', ascending=False).head(20)\n",
|
| 339 |
+
"from IPython.display import display\n",
|
| 340 |
+
"display(df)\n"
|
| 341 |
+
]
|
| 342 |
+
},
|
| 343 |
+
{
|
| 344 |
+
"cell_type": "code",
|
| 345 |
+
"execution_count": null,
|
| 346 |
+
"metadata": {},
|
| 347 |
+
"outputs": [],
|
| 348 |
+
"source": [
|
| 349 |
+
"# Citations for a specific CVE\n",
|
| 350 |
+
"# Default: take the first CVE from KEV triage if available; otherwise use the placeholder below.\n",
|
| 351 |
+
"try:\n",
|
| 352 |
+
" TARGET\n",
|
| 353 |
+
"except NameError:\n",
|
| 354 |
+
" try:\n",
|
| 355 |
+
" TARGET = DEFAULT_CVE_FOR_CITATIONS # set by KEV triage cell\n",
|
| 356 |
+
" except NameError:\n",
|
| 357 |
+
" TARGET = None\n",
|
| 358 |
+
" if TARGET is None:\n",
|
| 359 |
+
" TARGET = 'CVE-2021-44228' # change as desired\n",
|
| 360 |
+
"print('TARGET:', TARGET, '(set TARGET to override)')\n",
|
| 361 |
+
"\n",
|
| 362 |
+
"if engine == 'duckdb':\n",
|
| 363 |
+
" df = con.execute(\"\"\"\n",
|
| 364 |
+
" SELECT dst_id AS reference_url\n",
|
| 365 |
+
" FROM read_parquet(?)\n",
|
| 366 |
+
" WHERE src_type='cve' AND src_id=? AND edge_type='cve_ref_url'\n",
|
| 367 |
+
" ORDER BY reference_url\n",
|
| 368 |
+
" \"\"\", [str(PARQ/'edges.parquet'), TARGET]).df()\n",
|
| 369 |
+
"else:\n",
|
| 370 |
+
" import pandas as pd\n",
|
| 371 |
+
" e = pd.read_parquet(PARQ/'edges.parquet')\n",
|
| 372 |
+
" df = (\n",
|
| 373 |
+
" e[(e['src_type']=='cve') & (e['src_id']==TARGET) & (e['edge_type']=='cve_ref_url')]\n",
|
| 374 |
+
" [['dst_id']].rename(columns={'dst_id':'reference_url'})\n",
|
| 375 |
+
" .sort_values('reference_url')\n",
|
| 376 |
+
" )\n",
|
| 377 |
+
"from IPython.display import display\n",
|
| 378 |
+
"display(df)\n"
|
| 379 |
+
]
|
| 380 |
+
},
|
| 381 |
+
{
|
| 382 |
+
"cell_type": "code",
|
| 383 |
+
"execution_count": null,
|
| 384 |
+
"metadata": {},
|
| 385 |
+
"outputs": [],
|
| 386 |
+
"source": [
|
| 387 |
+
"# RAG config and retrieval (offline-only if model cached)\n",
|
| 388 |
+
"import pandas as pd\n",
|
| 389 |
+
"\n",
|
| 390 |
+
"# Read meta and print config\n",
|
| 391 |
+
"meta = pd.read_parquet(RAG/'meta.parquet')\n",
|
| 392 |
+
"assert bool(meta['normalize'][0]) and meta['metric'][0] == 'IP'\n",
|
| 393 |
+
"model_name = meta['model_name'][0]\n",
|
| 394 |
+
"dim = int(meta['dim'][0])\n",
|
| 395 |
+
"texts_count = int(meta.get('texts_count', pd.Series([None]))[0])\n",
|
| 396 |
+
"print({'model_name': model_name, 'dim': dim, 'normalize': True, 'metric': 'IP', 'texts_count': texts_count})\n",
|
| 397 |
+
"\n",
|
| 398 |
+
"# Enforce offline HF/Transformers and guard imports\n",
|
| 399 |
+
"import os\n",
|
| 400 |
+
"os.environ['HF_HUB_OFFLINE'] = '1'\n",
|
| 401 |
+
"os.environ['TRANSFORMERS_OFFLINE'] = '1'\n",
|
| 402 |
+
"\n",
|
| 403 |
+
"rag_enabled = True\n",
|
| 404 |
+
"try:\n",
|
| 405 |
+
" from sentence_transformers import SentenceTransformer\n",
|
| 406 |
+
" import faiss, numpy as np\n",
|
| 407 |
+
"except Exception as e:\n",
|
| 408 |
+
" print('RAG disabled (missing sentence-transformers or faiss):', e)\n",
|
| 409 |
+
" rag_enabled = False\n",
|
| 410 |
+
"\n",
|
| 411 |
+
"if rag_enabled:\n",
|
| 412 |
+
" try:\n",
|
| 413 |
+
" model = SentenceTransformer(model_name)\n",
|
| 414 |
+
" index = faiss.read_index(str(RAG/'index.faiss'))\n",
|
| 415 |
+
" id_map = pd.read_parquet(RAG/'mapping.parquet')\n",
|
| 416 |
+
"\n",
|
| 417 |
+
" query = 'recent OpenSSL remote exploit'\n",
|
| 418 |
+
" qvec = model.encode([query], normalize_embeddings=True)\n",
|
| 419 |
+
" D, I = index.search(np.asarray(qvec, dtype='float32'), 10)\n",
|
| 420 |
+
" print('scores:', D[0].tolist())\n",
|
| 421 |
+
" from IPython.display import display\n",
|
| 422 |
+
" hits = id_map[id_map['row_index'].isin(I[0].tolist())].merge(\n",
|
| 423 |
+
" pd.DataFrame({'row_index': I[0].tolist()}), on='row_index', how='right'\n",
|
| 424 |
+
" )\n",
|
| 425 |
+
" display(hits)\n",
|
| 426 |
+
" except Exception as e:\n",
|
| 427 |
+
" print('RAG skipped (model not cached or index missing):', e)\n",
|
| 428 |
+
" print('Tip: pre-cache once online, then re-run offline:')\n",
|
| 429 |
+
" print(\"from sentence_transformers import SentenceTransformer; SentenceTransformer('BAAI/bge-small-en-v1.5')\")\n"
|
| 430 |
+
]
|
| 431 |
+
},
|
| 432 |
+
{
|
| 433 |
+
"cell_type": "code",
|
| 434 |
+
"execution_count": null,
|
| 435 |
+
"metadata": {},
|
| 436 |
+
"outputs": [],
|
| 437 |
+
"source": [
|
| 438 |
+
"# Consistency checks (fast)\n",
|
| 439 |
+
"if engine == 'duckdb':\n",
|
| 440 |
+
" kev_total = con.execute(\"SELECT COUNT(*) FROM read_parquet(?)\", [str(PARQ/'kev.parquet')]).fetchone()[0]\n",
|
| 441 |
+
" kev_without_cve = con.execute(\"\"\"\n",
|
| 442 |
+
" SELECT COUNT(*) FROM read_parquet(?) k\n",
|
| 443 |
+
" LEFT JOIN read_parquet(?) c ON c.cve_id = k.cve_id\n",
|
| 444 |
+
" WHERE c.cve_id IS NULL\n",
|
| 445 |
+
" \"\"\", [str(PARQ/'kev.parquet'), str(PARQ/'cve.parquet')]).fetchone()[0]\n",
|
| 446 |
+
"\n",
|
| 447 |
+
" edges_with_missing_cve = con.execute(\"\"\"\n",
|
| 448 |
+
" SELECT COUNT(*) FROM read_parquet(?) e\n",
|
| 449 |
+
" LEFT JOIN read_parquet(?) c ON c.cve_id = e.src_id\n",
|
| 450 |
+
" WHERE e.src_type='cve' AND c.cve_id IS NULL\n",
|
| 451 |
+
" \"\"\", [str(PARQ/'edges.parquet'), str(PARQ/'cve.parquet')]).fetchone()[0]\n",
|
| 452 |
+
"\n",
|
| 453 |
+
" sample_missing = [r[0] for r in con.execute(\"\"\"\n",
|
| 454 |
+
" SELECT k.cve_id\n",
|
| 455 |
+
" FROM read_parquet(?) k\n",
|
| 456 |
+
" LEFT JOIN read_parquet(?) c ON c.cve_id = k.cve_id\n",
|
| 457 |
+
" WHERE c.cve_id IS NULL\n",
|
| 458 |
+
" ORDER BY k.cve_id\n",
|
| 459 |
+
" LIMIT 5\n",
|
| 460 |
+
" \"\"\", [str(PARQ/'kev.parquet'), str(PARQ/'cve.parquet')]).fetchall()]\n",
|
| 461 |
+
"\n",
|
| 462 |
+
" kev_with_cve = int(kev_total) - int(kev_without_cve)\n",
|
| 463 |
+
" coverage_ratio = (kev_with_cve / kev_total) if kev_total else 0.0\n",
|
| 464 |
+
"\n",
|
| 465 |
+
" print({\n",
|
| 466 |
+
" 'kev_total': int(kev_total),\n",
|
| 467 |
+
" 'kev_with_cve': int(kev_with_cve),\n",
|
| 468 |
+
" 'kev_without_cve': int(kev_without_cve),\n",
|
| 469 |
+
" 'kev_cve_coverage_ratio': coverage_ratio,\n",
|
| 470 |
+
" 'edges_with_missing_cve': int(edges_with_missing_cve),\n",
|
| 471 |
+
" 'sample_missing_cves': sample_missing,\n",
|
| 472 |
+
" })\n",
|
| 473 |
+
"else:\n",
|
| 474 |
+
" print('Consistency checks require DuckDB for speed; skipped.')\n"
|
| 475 |
+
]
|
| 476 |
+
}
|
| 477 |
+
],
|
| 478 |
+
"metadata": {
|
| 479 |
+
"language_info": {
|
| 480 |
+
"name": "python"
|
| 481 |
+
}
|
| 482 |
+
},
|
| 483 |
+
"nbformat": 4,
|
| 484 |
+
"nbformat_minor": 2
|
| 485 |
+
}
|
demo/requirements-colab.txt
ADDED
|
@@ -0,0 +1,8 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
duckdb>=1.0.0
|
| 2 |
+
pandas>=2.0.0
|
| 3 |
+
pyarrow>=15.0.0
|
| 4 |
+
numpy>=1.26.0
|
| 5 |
+
faiss-cpu>=1.7.4
|
| 6 |
+
sentence-transformers<3.0.0
|
| 7 |
+
huggingface_hub>=0.20.0
|
| 8 |
+
|
docs/BUILD_MANIFEST.json
ADDED
|
@@ -0,0 +1 @@
|
|
|
|
|
|
|
| 1 |
+
{"snapshot_as_of":"2025-10-29T13:51:37Z","build_started_at":"2025-10-29T17:49:43Z","build_finished_at":"2025-10-29T17:49:43Z","python_version":"3.12.2","platform":"macOS-15.6.1-arm64-arm-64bit","os_release":"24.6.0","packages":{},"model_name":"BAAI/bge-small-en-v1.5","model_dim":384,"nvd_window_days":90,"git_commit":"d5ac518dcf3118f1c02eed15d147f71f23e0c3ea"}
|
docs/INTEGRITY.txt
ADDED
|
@@ -0,0 +1,11 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
2813808c65fde193a159b6ae5d101e66c35995a03bbc38f33057e0592c92d2a0 docs/VALIDATION.json
|
| 2 |
+
4c26c49fac2c2288ed78fce5e1620cfa9b36320a393543ae939d1533e0cf35da parquet/.counts.json
|
| 3 |
+
1224f3dd4152fb70e523a47bf244ba01582445fa25ff1b2a4000b2847e06f6f1 parquet/cve.parquet
|
| 4 |
+
036f9af67420d301078c4a88f1caa4eda1c63354e429d8ea73198617b8c5c911 parquet/edges.parquet
|
| 5 |
+
6268b8d528b37604dc8846e8a19c212dcd85d61dee9542d1d79ea92e6eeef1fc parquet/kev.parquet
|
| 6 |
+
a6ad1ddf69d59486a91850d5b0ea810bf181c7c6b10830adbc38d80da908de03 parquet/nvd_meta.parquet
|
| 7 |
+
d07b58ecb437b479af8a02fc49f46f80166ccdd2c2f4abd1418e207cda38e84a parquet/preview.parquet
|
| 8 |
+
b60669f24f2050cd441139a4f58dc07d2e2e8330ebce75fc3b88ebc44f6e557c rag/index.faiss
|
| 9 |
+
380b434b36326888988f02fe47dff53e4a8b079a563e8352477c3ff8a3623052 rag/mapping.parquet
|
| 10 |
+
95c0c3c104e28012ebf0cbacbf20346d992a6ed3960aa9792a6436743de726f3 rag/meta.parquet
|
| 11 |
+
9dd9c208dc7bceef09351a5b3e807bf50e7f5e0a5e51c4768e65b29634c4fca6 rag/vectors.npy
|
docs/LICENCE.md
ADDED
|
@@ -0,0 +1,121 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
Creative Commons Legal Code
|
| 2 |
+
|
| 3 |
+
CC0 1.0 Universal
|
| 4 |
+
|
| 5 |
+
CREATIVE COMMONS CORPORATION IS NOT A LAW FIRM AND DOES NOT PROVIDE
|
| 6 |
+
LEGAL SERVICES. DISTRIBUTION OF THIS DOCUMENT DOES NOT CREATE AN
|
| 7 |
+
ATTORNEY-CLIENT RELATIONSHIP. CREATIVE COMMONS PROVIDES THIS
|
| 8 |
+
INFORMATION ON AN "AS-IS" BASIS. CREATIVE COMMONS MAKES NO WARRANTIES
|
| 9 |
+
REGARDING THE USE OF THIS DOCUMENT OR THE INFORMATION OR WORKS
|
| 10 |
+
PROVIDED HEREUNDER, AND DISCLAIMS LIABILITY FOR DAMAGES RESULTING FROM
|
| 11 |
+
THE USE OF THIS DOCUMENT OR THE INFORMATION OR WORKS PROVIDED
|
| 12 |
+
HEREUNDER.
|
| 13 |
+
|
| 14 |
+
Statement of Purpose
|
| 15 |
+
|
| 16 |
+
The laws of most jurisdictions throughout the world automatically confer
|
| 17 |
+
exclusive Copyright and Related Rights (defined below) upon the creator
|
| 18 |
+
and subsequent owner(s) (each and all, an "owner") of an original work of
|
| 19 |
+
authorship and/or a database (each, a "Work").
|
| 20 |
+
|
| 21 |
+
Certain owners wish to permanently relinquish those rights to a Work for
|
| 22 |
+
the purpose of contributing to a commons of creative, cultural and
|
| 23 |
+
scientific works ("Commons") that the public can reliably and without fear
|
| 24 |
+
of later claims of infringement build upon, modify, incorporate in other
|
| 25 |
+
works, reuse and redistribute as freely as possible in any form whatsoever
|
| 26 |
+
and for any purposes, including without limitation commercial purposes.
|
| 27 |
+
These owners may contribute to the Commons to promote the ideal of a free
|
| 28 |
+
culture and the further production of creative, cultural and scientific
|
| 29 |
+
works, or to gain reputation or greater distribution for their Work in
|
| 30 |
+
part through the use and efforts of others.
|
| 31 |
+
|
| 32 |
+
For these and/or other purposes and motivations, and without any
|
| 33 |
+
expectation of additional consideration or compensation, the person
|
| 34 |
+
associating CC0 with a Work (the "Affirmer"), to the extent that he or she
|
| 35 |
+
is an owner of Copyright and Related Rights in the Work, voluntarily
|
| 36 |
+
elects to apply CC0 to the Work and publicly distribute the Work under its
|
| 37 |
+
terms, with knowledge of his or her Copyright and Related Rights in the
|
| 38 |
+
Work and the meaning and intended legal effect of CC0 on those rights.
|
| 39 |
+
|
| 40 |
+
1. Copyright and Related Rights. A Work made available under CC0 may be
|
| 41 |
+
protected by copyright and related or neighboring rights ("Copyright and
|
| 42 |
+
Related Rights"). Copyright and Related Rights include, but are not
|
| 43 |
+
limited to, the following:
|
| 44 |
+
i. the right to reproduce, adapt, distribute, perform, display,
|
| 45 |
+
communicate, and translate a Work;
|
| 46 |
+
ii. moral rights retained by the original author(s) and/or performer(s);
|
| 47 |
+
iii. publicity and privacy rights pertaining to a person's image or
|
| 48 |
+
likeness depicted in a Work;
|
| 49 |
+
iv. rights protecting against unfair competition in regards to a Work,
|
| 50 |
+
subject to the limitations in paragraph 4(a), below;
|
| 51 |
+
v. rights protecting the extraction, dissemination, use and reuse of
|
| 52 |
+
data in a Work;
|
| 53 |
+
vi. database rights (such as those arising under Directive 96/9/EC of
|
| 54 |
+
the European Parliament and of the Council of 11 March 1996 on the
|
| 55 |
+
legal protection of databases, and under any national implementation
|
| 56 |
+
thereof, including any amended or successor version of such
|
| 57 |
+
directive); and
|
| 58 |
+
vii. other similar, equivalent or corresponding rights throughout the
|
| 59 |
+
world based on applicable law or treaty, and any national
|
| 60 |
+
implementations thereof.
|
| 61 |
+
|
| 62 |
+
2. Waiver. To the greatest extent permitted by, but not in contravention
|
| 63 |
+
of, applicable law, Affirmer hereby overtly, fully, permanently,
|
| 64 |
+
irrevocably and unconditionally waives, abandons, and surrenders all of
|
| 65 |
+
Affirmer's Copyright and Related Rights and associated claims and causes
|
| 66 |
+
of action, whether now known or unknown (including existing as well as
|
| 67 |
+
future claims and causes of action), in the Work (i) in all territories
|
| 68 |
+
worldwide, (ii) for the maximum duration provided by applicable law or
|
| 69 |
+
treaty (including future time extensions), (iii) in any current or future
|
| 70 |
+
medium and for any number of copies, and (iv) for any purpose whatsoever,
|
| 71 |
+
including without limitation commercial, advertising or promotional
|
| 72 |
+
purposes (the "Waiver"). Affirmer makes the Waiver for the benefit of each
|
| 73 |
+
member of the public at large and to the detriment of Affirmer's heirs and
|
| 74 |
+
successors, fully intending that such Waiver shall not be subject to
|
| 75 |
+
revocation, rescission, cancellation, termination, or any other legal or
|
| 76 |
+
equitable action to disrupt the quiet enjoyment of the Work by the public
|
| 77 |
+
as contemplated by Affirmer's express Statement of Purpose.
|
| 78 |
+
|
| 79 |
+
3. Public License Fallback. Should any part of the Waiver for any reason
|
| 80 |
+
be judged legally invalid or ineffective under applicable law, then the
|
| 81 |
+
Waiver shall be preserved to the maximum extent permitted taking into
|
| 82 |
+
account Affirmer's express Statement of Purpose. In addition, to the
|
| 83 |
+
extent the Waiver is so judged Affirmer hereby grants to each affected
|
| 84 |
+
person a royalty-free, non transferable, non sublicensable, non exclusive,
|
| 85 |
+
irrevocable and unconditional license to exercise Affirmer's Copyright and
|
| 86 |
+
Related Rights in the Work (i) in all territories worldwide, (ii) for the
|
| 87 |
+
maximum duration provided by applicable law or treaty (including future
|
| 88 |
+
time extensions), (iii) in any current or future medium and for any number
|
| 89 |
+
of copies, and (iv) for any purpose whatsoever, including without
|
| 90 |
+
limitation commercial, advertising or promotional purposes (the
|
| 91 |
+
"License"). The License shall be deemed effective as of the date CC0 was
|
| 92 |
+
applied by Affirmer to the Work. Should any part of the License for any
|
| 93 |
+
reason be judged legally invalid or ineffective under applicable law, such
|
| 94 |
+
partial invalidity or ineffectiveness shall not invalidate the remainder
|
| 95 |
+
of the License, and in such case Affirmer hereby affirms that he or she
|
| 96 |
+
will not (i) exercise any of his or her remaining Copyright and Related
|
| 97 |
+
Rights in the Work or (ii) assert any associated claims and causes of
|
| 98 |
+
action with respect to the Work, in either case contrary to Affirmer's
|
| 99 |
+
express Statement of Purpose.
|
| 100 |
+
|
| 101 |
+
4. Limitations and Disclaimers.
|
| 102 |
+
a. No trademark or patent rights held by Affirmer are waived, abandoned,
|
| 103 |
+
surrendered, licensed or otherwise affected by this document.
|
| 104 |
+
b. Affirmer offers the Work as-is and makes no representations or
|
| 105 |
+
warranties of any kind concerning the Work, express, implied,
|
| 106 |
+
statutory or otherwise, including without limitation warranties of
|
| 107 |
+
title, merchantability, fitness for a particular purpose, non
|
| 108 |
+
infringement, or the absence of latent or other defects, accuracy, or
|
| 109 |
+
the present or absence of errors, whether or not discoverable, all to
|
| 110 |
+
the greatest extent permissible under applicable law.
|
| 111 |
+
c. Affirmer disclaims responsibility for clearing rights of other persons
|
| 112 |
+
that may apply to the Work or any use thereof, including without
|
| 113 |
+
limitation any person's Copyright and Related Rights in the Work.
|
| 114 |
+
Further, Affirmer disclaims responsibility for obtaining any necessary
|
| 115 |
+
consents, permissions or other rights required for any use of the
|
| 116 |
+
Work.
|
| 117 |
+
d. Affirmer understands and acknowledges that Creative Commons is not a
|
| 118 |
+
party to this document and has no duty or obligation with respect to
|
| 119 |
+
this CC0 or use of the Work.
|
| 120 |
+
|
| 121 |
+
|
docs/LICENSES.md
ADDED
|
@@ -0,0 +1,41 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
## Licenses and Source Status
|
| 2 |
+
|
| 3 |
+
Snapshot timestamp (UTC): 2025-10-29T13:51:37Z
|
| 4 |
+
|
| 5 |
+
### Compiled artifact license (this dataset)
|
| 6 |
+
|
| 7 |
+
- License: CC0 1.0 Universal (Public Domain Dedication)
|
| 8 |
+
- Intent: Dedicate the compiled snapshot to the public domain.
|
| 9 |
+
- See: `https://creativecommons.org/publicdomain/zero/1.0/`
|
| 10 |
+
|
| 11 |
+
### Upstream sources included in the core snapshot
|
| 12 |
+
|
| 13 |
+
- NVD (National Vulnerability Database)
|
| 14 |
+
- Status: Public Domain (U.S. Government work; not subject to copyright)
|
| 15 |
+
- Site: `https://nvd.nist.gov`
|
| 16 |
+
- Notes: The snapshot includes minimal, factual metadata derived from NVD records (e.g., CVE IDs, short descriptions, CVSS/CWE, reference URLs). Reference URLs are preserved exactly.
|
| 17 |
+
- Additional note: NVD data are U.S. Government works (public domain). Some material may be subject to foreign copyright.
|
| 18 |
+
|
| 19 |
+
- CISA Known Exploited Vulnerabilities (KEV) Catalog
|
| 20 |
+
- License: CC0 1.0
|
| 21 |
+
- Site: `https://www.cisa.gov/known-exploited-vulnerabilities-catalog`
|
| 22 |
+
- License text: `https://www.cisa.gov/sites/default/files/licenses/kev/license.txt`
|
| 23 |
+
- Notes: The snapshot includes KEV fields such as `cveID`, `dateAdded`, and `notes`.
|
| 24 |
+
|
| 25 |
+
### Explicit exclusions (not part of the core snapshot)
|
| 26 |
+
|
| 27 |
+
- GitHub Security Advisories (GHSA): CC-BY-4.0; attribution required. Excluded from the core to keep the artifact PD/CC0-only.
|
| 28 |
+
- OSV (Open Source Vulnerabilities): licenses vary by upstream source. Excluded from the core to avoid mixed licensing.
|
| 29 |
+
|
| 30 |
+
### RAG pack content
|
| 31 |
+
|
| 32 |
+
- The retrieval index (FAISS) is constructed only from PD/CC0 text fields (NVD short descriptions and KEV notes).
|
| 33 |
+
|
| 34 |
+
### Notes
|
| 35 |
+
|
| 36 |
+
- This file summarizes license posture for the released snapshot: PD/CC0-only inputs, compiled artifact dedicated under CC0 1.0.
|
| 37 |
+
- See `NOTICE.md` for non-affiliation and warranty disclaimers.
|
| 38 |
+
|
| 39 |
+
### Scope
|
| 40 |
+
|
| 41 |
+
This licensing summary applies to the **dataset** only. Any code or notebooks in this repository (if present) are licensed separately; see the license file at the repository root (e.g., MIT).
|
docs/NOTICE.md
ADDED
|
@@ -0,0 +1,25 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
## Notice
|
| 2 |
+
|
| 3 |
+
Snapshot timestamp (UTC): 2025-10-29T13:51:37Z
|
| 4 |
+
|
| 5 |
+
### Non-affiliation
|
| 6 |
+
|
| 7 |
+
- This project is not affiliated with NIST/NVD, CISA/KEV, FIRST/EPSS, or any of their programs. Names and links are used for descriptive purposes only.
|
| 8 |
+
- NVD non-endorsement: "This product uses data from the NVD API but is not endorsed or certified by the NVD."
|
| 9 |
+
- All product names, logos, and brands are property of their respective owners; use here is for identification only and does not imply endorsement.
|
| 10 |
+
|
| 11 |
+
### Warranty and usage
|
| 12 |
+
|
| 13 |
+
- WITHOUT WARRANTIES OF ANY KIND, express or implied, including merchantability, fitness for a particular purpose, and non-infringement. Verify with linked official sources before relying operationally.
|
| 14 |
+
- The snapshot is an immutable, one-time data drop intended for evaluation, prototyping, and research.
|
| 15 |
+
- No SLA or support is provided. Issues/Discussions are welcome for feedback only.
|
| 16 |
+
|
| 17 |
+
### Licensing summary
|
| 18 |
+
|
| 19 |
+
- The compiled artifact is dedicated to the public domain under CC0 1.0.
|
| 20 |
+
- Inputs are PD/CC0-only (NVD public domain; CISA KEV under CC0). Attribution-required sources (e.g., GHSA/OSV) are intentionally excluded from the core snapshot.
|
| 21 |
+
- Linked third-party pages (vendor advisories, blogs, etc.) are not covered by this dataset’s CC0 dedication; their terms apply.
|
| 22 |
+
|
| 23 |
+
### Integrity and transparency
|
| 24 |
+
|
| 25 |
+
- Verify `docs/INTEGRITY.txt` (SHA-256 list) using standard tools.
|
docs/VALIDATION.json
ADDED
|
@@ -0,0 +1 @@
|
|
|
|
|
|
|
| 1 |
+
{"counts":{"cve_rows":12307,"nvd_meta_rows":12307,"kev_rows":28,"edges_rows":44035},"row_counts":{"cve.parquet":12307,"nvd_meta.parquet":12307,"kev.parquet":28,"edges.parquet":44035},"cvss_v3_presence_ratio":0.760137,"cwe_presence_ratio":0.827659,"kev_cve_coverage_ratio":1.0,"kev_cve_coverage_ratio_within_window":1.0,"rejected_cve_count":103,"duplicate_edges_dropped":2027,"edges_with_missing_cve":0,"url_malformed_count":0,"url_timeout_count":5487,"url_http_error_count":744,"url_forbidden_or_method_not_allowed_count":1502,"dead_reference_links":6231,"url_shape_failures":0,"http_head_failures_hard":744,"http_head_failures_flaky":5487,"kev_rows_total_fetched":1451,"kev_rows_within_window":28,"kev_rows_filtered_out":1423,"kev_within_window_over_global_ratio":0.019297,"url_checks_performed":true,"url_checks_sampled":false,"url_checks_evaluated":33233,"snapshot_as_of":"2025-10-29T13:51:37Z"}
|
parquet/.counts.json
ADDED
|
@@ -0,0 +1 @@
|
|
|
|
|
|
|
| 1 |
+
{"duplicate_edges_dropped": 2027, "kev_rows_total_fetched": 1451, "kev_rows_within_window": 28}
|
parquet/cve.parquet
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:1224f3dd4152fb70e523a47bf244ba01582445fa25ff1b2a4000b2847e06f6f1
|
| 3 |
+
size 4266133
|
parquet/edges.parquet
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:036f9af67420d301078c4a88f1caa4eda1c63354e429d8ea73198617b8c5c911
|
| 3 |
+
size 1032955
|
parquet/kev.parquet
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:6268b8d528b37604dc8846e8a19c212dcd85d61dee9542d1d79ea92e6eeef1fc
|
| 3 |
+
size 8427
|
parquet/nvd_meta.parquet
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:a6ad1ddf69d59486a91850d5b0ea810bf181c7c6b10830adbc38d80da908de03
|
| 3 |
+
size 1862384
|
parquet/preview.parquet
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:d07b58ecb437b479af8a02fc49f46f80166ccdd2c2f4abd1418e207cda38e84a
|
| 3 |
+
size 163537
|
rag/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:b60669f24f2050cd441139a4f58dc07d2e2e8330ebce75fc3b88ebc44f6e557c
|
| 3 |
+
size 18946605
|
rag/mapping.parquet
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:380b434b36326888988f02fe47dff53e4a8b079a563e8352477c3ff8a3623052
|
| 3 |
+
size 159446
|
rag/meta.parquet
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:95c0c3c104e28012ebf0cbacbf20346d992a6ed3960aa9792a6436743de726f3
|
| 3 |
+
size 1495
|
rag/vectors.npy
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:9dd9c208dc7bceef09351a5b3e807bf50e7f5e0a5e51c4768e65b29634c4fca6
|
| 3 |
+
size 18946688
|