vivi365 commited on
Commit
8ddb00c
·
verified ·
1 Parent(s): 8315a4b

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +59 -1
README.md CHANGED
@@ -1 +1,59 @@
1
- # go
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ dataset_name: "Vulnerability Dataset"
3
+ dataset_description: |
4
+ This dataset contains information on vulnerabilities found in open-source repositories, including CVEs, CWEs, affected packages, severity levels, and remediation steps.
5
+
6
+ license: "Apache-2.0"
7
+ homepage: "https://huggingface.co/datasets/vulnerability-dataset"
8
+ dataset_tags:
9
+ - security
10
+ - vulnerabilities
11
+ - CVE
12
+ - CWE
13
+ - cryptography
14
+
15
+ dataset_columns:
16
+ - _id: "Unique identifier for each vulnerability entry."
17
+ - repo: "Repository where the vulnerability was found."
18
+ - references: "Links to related commits, advisories, or release notes."
19
+ - cve: "Common Vulnerabilities and Exposures (CVE) identifier."
20
+ - cwe: "Common Weakness Enumeration (CWE) identifier."
21
+ - vul_packages: "Affected packages with details on version range, severity, and remediation."
22
+
23
+ instances:
24
+ - _id: 1226
25
+ repo: "github.com/matrix-org/dendrite"
26
+ references:
27
+ - "https://github.com/matrix-org/dendrite/commit/2792d0490f3771488bad346981b8c26479a872c3"
28
+ cve: "CVE-2022-39200"
29
+ cwe: "CWE-347"
30
+ vul_packages:
31
+ - package: "github.com/matrix-org/dendrite/roomserver/internal/input"
32
+ publish: "Introduced: 13 Sep 2022"
33
+ vul_name: "Improper Verification of Cryptographic Signature"
34
+ vul_range: "<0.9.8"
35
+ level: "high"
36
+ score: "7.3"
37
+ remediation: "Upgrade github.com/matrix-org/dendrite/roomserver/internal/input to version 0.9.8 or higher."
38
+ overview: |
39
+ github.com/matrix-org/dendrite/roomserver/internal/input is a second-generation Matrix homeserver written in Go.
40
+ Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature of events retrieved from a remote homeserver using /get_missing_events endpoint.
41
+ Note: This vulnerability does not apply to events retrieved through other endpoints (e.g. /event, /state) as they have been correctly verified.
42
+
43
+ - _id: 1242
44
+ repo: "github.com/sigstore/policy-controller"
45
+ references:
46
+ - "https://github.com/sigstore/policy-controller/commit/e852af36fb7d42678b21d7e97503c25bd1fd05c8"
47
+ - "https://github.com/sigstore/policy-controller/releases/tag/v0.2.1"
48
+ cve: "CVE-2022-35930"
49
+ cwe: "CWE-310"
50
+ vul_packages:
51
+ - package: "github.com/sigstore/policy-controller/pkg/webhook"
52
+ publish: "Introduced: 5 Aug 2022"
53
+ vul_name: "Cryptographic Issues"
54
+ vul_range: "<0.2.1"
55
+ level: "medium"
56
+ score: "6.7"
57
+ remediation: "Upgrade github.com/sigstore/policy-controller/pkg/webhook to version 0.2.1 or higher."
58
+ overview: |
59
+ Affected versions of this package are vulnerable to Cryptographic Issues when there is at least one attestation with a valid signature, and there are no attestations of the type being verified (--type defaults to "custom").