Update README.md
Browse files
README.md
CHANGED
@@ -1 +1,59 @@
|
|
1 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
---
|
2 |
+
dataset_name: "Vulnerability Dataset"
|
3 |
+
dataset_description: |
|
4 |
+
This dataset contains information on vulnerabilities found in open-source repositories, including CVEs, CWEs, affected packages, severity levels, and remediation steps.
|
5 |
+
|
6 |
+
license: "Apache-2.0"
|
7 |
+
homepage: "https://huggingface.co/datasets/vulnerability-dataset"
|
8 |
+
dataset_tags:
|
9 |
+
- security
|
10 |
+
- vulnerabilities
|
11 |
+
- CVE
|
12 |
+
- CWE
|
13 |
+
- cryptography
|
14 |
+
|
15 |
+
dataset_columns:
|
16 |
+
- _id: "Unique identifier for each vulnerability entry."
|
17 |
+
- repo: "Repository where the vulnerability was found."
|
18 |
+
- references: "Links to related commits, advisories, or release notes."
|
19 |
+
- cve: "Common Vulnerabilities and Exposures (CVE) identifier."
|
20 |
+
- cwe: "Common Weakness Enumeration (CWE) identifier."
|
21 |
+
- vul_packages: "Affected packages with details on version range, severity, and remediation."
|
22 |
+
|
23 |
+
instances:
|
24 |
+
- _id: 1226
|
25 |
+
repo: "github.com/matrix-org/dendrite"
|
26 |
+
references:
|
27 |
+
- "https://github.com/matrix-org/dendrite/commit/2792d0490f3771488bad346981b8c26479a872c3"
|
28 |
+
cve: "CVE-2022-39200"
|
29 |
+
cwe: "CWE-347"
|
30 |
+
vul_packages:
|
31 |
+
- package: "github.com/matrix-org/dendrite/roomserver/internal/input"
|
32 |
+
publish: "Introduced: 13 Sep 2022"
|
33 |
+
vul_name: "Improper Verification of Cryptographic Signature"
|
34 |
+
vul_range: "<0.9.8"
|
35 |
+
level: "high"
|
36 |
+
score: "7.3"
|
37 |
+
remediation: "Upgrade github.com/matrix-org/dendrite/roomserver/internal/input to version 0.9.8 or higher."
|
38 |
+
overview: |
|
39 |
+
github.com/matrix-org/dendrite/roomserver/internal/input is a second-generation Matrix homeserver written in Go.
|
40 |
+
Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature of events retrieved from a remote homeserver using /get_missing_events endpoint.
|
41 |
+
Note: This vulnerability does not apply to events retrieved through other endpoints (e.g. /event, /state) as they have been correctly verified.
|
42 |
+
|
43 |
+
- _id: 1242
|
44 |
+
repo: "github.com/sigstore/policy-controller"
|
45 |
+
references:
|
46 |
+
- "https://github.com/sigstore/policy-controller/commit/e852af36fb7d42678b21d7e97503c25bd1fd05c8"
|
47 |
+
- "https://github.com/sigstore/policy-controller/releases/tag/v0.2.1"
|
48 |
+
cve: "CVE-2022-35930"
|
49 |
+
cwe: "CWE-310"
|
50 |
+
vul_packages:
|
51 |
+
- package: "github.com/sigstore/policy-controller/pkg/webhook"
|
52 |
+
publish: "Introduced: 5 Aug 2022"
|
53 |
+
vul_name: "Cryptographic Issues"
|
54 |
+
vul_range: "<0.2.1"
|
55 |
+
level: "medium"
|
56 |
+
score: "6.7"
|
57 |
+
remediation: "Upgrade github.com/sigstore/policy-controller/pkg/webhook to version 0.2.1 or higher."
|
58 |
+
overview: |
|
59 |
+
Affected versions of this package are vulnerable to Cryptographic Issues when there is at least one attestation with a valid signature, and there are no attestations of the type being verified (--type defaults to "custom").
|