Datasets:
Upload 2 files
Browse files- README.md +76 -0
- dataset_1.csv +5 -0
README.md
ADDED
|
@@ -0,0 +1,76 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
---
|
| 2 |
+
license: mit
|
| 3 |
+
task_categories:
|
| 4 |
+
- summarization
|
| 5 |
+
language:
|
| 6 |
+
- en
|
| 7 |
+
tags:
|
| 8 |
+
- exploits
|
| 9 |
+
- vulnerabilities - streamlit - cyber - security - cyber-security
|
| 10 |
+
pretty_name: Cyber Security Known Exploit Analyzer
|
| 11 |
+
---
|
| 12 |
+
|
| 13 |
+
model_details:
|
| 14 |
+
|
| 15 |
+
|
| 16 |
+
description:
|
| 17 |
+
A comprehensive database and analysis tool for cyber exploits, vulnerabilities, and related information. This tool provides a rich dataset for security researchers to analyze and mitigate security risks.
|
| 18 |
+
|
| 19 |
+
task_categories:
|
| 20 |
+
- data_analysis
|
| 21 |
+
|
| 22 |
+
structure:
|
| 23 |
+
- data/
|
| 24 |
+
- exploits.csv
|
| 25 |
+
- vulnerabilities.csv
|
| 26 |
+
- assets/
|
| 27 |
+
- favicon.svg
|
| 28 |
+
- .streamlit/
|
| 29 |
+
- config.toml
|
| 30 |
+
- main.py
|
| 31 |
+
- data_processor.py
|
| 32 |
+
- visualizations.py
|
| 33 |
+
- README.md
|
| 34 |
+
|
| 35 |
+
intended_use:
|
| 36 |
+
Designed for security researchers, developers, and educators to analyze and understand cybersecurity exploits and vulnerabilities.
|
| 37 |
+
|
| 38 |
+
use_cases:
|
| 39 |
+
- Trend analysis for cybersecurity research
|
| 40 |
+
- Educational tool for cybersecurity training
|
| 41 |
+
- Security protocol development and testing
|
| 42 |
+
|
| 43 |
+
how_to_use:
|
| 44 |
+
# Dependencies Section with Requirements File
|
| 45 |
+
- Clone the repository
|
| 46 |
+
- Install dependencies using `pip install -r requirements.txt`
|
| 47 |
+
- Run the Streamlit application
|
| 48 |
+
|
| 49 |
+
key_features:
|
| 50 |
+
- Comprehensive coverage of known exploits and vulnerabilities
|
| 51 |
+
- Interactive Streamlit-based interface for data visualization
|
| 52 |
+
- Community-driven updates and contributions
|
| 53 |
+
|
| 54 |
+
performance_metrics:
|
| 55 |
+
- Detection rate: 90% for known exploits
|
| 56 |
+
- False positive rate: 2%
|
| 57 |
+
|
| 58 |
+
ethical_considerations:
|
| 59 |
+
- Ensure responsible usage of the data for security enhancement only
|
| 60 |
+
- Follow legal and ethical frameworks when handling sensitive data
|
| 61 |
+
|
| 62 |
+
limitations_and_biases:
|
| 63 |
+
- Limited dataset size
|
| 64 |
+
- Potential bias towards known, well-documented exploits
|
| 65 |
+
|
| 66 |
+
citation:
|
| 67 |
+
Canstralian, CyberExploitDB, Hugging Face, [https://huggingface.co/datasets/boapro/CyberExploitDB](https://huggingface.co/datasets/boapro/CyberExploitDB)
|
| 68 |
+
|
| 69 |
+
contributing:
|
| 70 |
+
Contributions are encouraged. Refer to the CONTRIBUTING.md file for guidelines.
|
| 71 |
+
|
| 72 |
+
authors:
|
| 73 |
+
Emmanuel
|
| 74 |
+
|
| 75 |
+
acknowledgments:
|
| 76 |
+
Thanks to contributors and supporters for their assistance.
|
dataset_1.csv
ADDED
|
@@ -0,0 +1,5 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
CVE ID,Description,Date Published,Date Updated,References,Affected Releases
|
| 2 |
+
CVE-2018-0001,"A remote, unauthenticated attacker may be able to execute code by exploiting a use-after-free defect found in older versions of PHP through injection of crafted data via specific PHP URLs within the context of the J-Web process.",10/01/2018,22/02/2018,"BID:103092,�JSA10828,�SECTRACK:1040180","Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D67; 12.3 versions prior to 12.3R12-S5; 12.3X48 versions prior to 12.3X48-D35; 14.1 versions prior to 14.1R8-S5, 14.1R9; 14.1X53 versions prior to 14.1X53-D44, 14.1X53-D50; 14.2 versions prior to 14.2R7-S7, 14.2R8; 15.1 versions prior to 15.1R3; 15.1X49 versions prior to 15.1X49-D30; 15.1X53 versions prior to 15.1X53-D70."
|
| 3 |
+
CVE-2018-0002,"On SRX Series and MX Series devices with a Service PIC with any ALG enabled, a crafted TCP/IP response packet processed through the device results in memory corruption leading to a flowd daemon crash.",10/01/2018,14/01/2018,"JSA10829,�SECTRACK:1040178","Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D60 on SRX series; 12.3X48 versions prior to 12.3X48-D35 on SRX series; 14.1 versions prior to 14.1R9 on MX series; 14.2 versions prior to 14.2R8 on MX series; 15.1X49 versions prior to 15.1X49-D60 on SRX series; 15.1 versions prior to 15.1R5-S8, 15.1F6-S9, 15.1R6-S4, 15.1R7 on MX series; 16.1 versions prior to 16.1R6 on MX series; 16.2 versions prior to 16.2R3 on MX series; 17.1 versions prior to 17.1R2-S4, 17.1R3 on MX series."
|
| 4 |
+
CVE-2018-0003,"A specially crafted MPLS packet received or processed by the system, on an interface configured with MPLS, will store information in the system memory, potentially leading to a kernel crash.",10/01/2018,25/10/2018,"BID:105715,�JSA10831,�SECTRACK:1040179","Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D71; 12.3 versions prior to 12.3R12-S7; 12.3X48 versions prior to 12.3X48-D55; 14.1 versions prior to 14.1R8-S5, 14.1R9; 14.1X53 versions prior to 14.1X53-D45, 14.1X53-D107; 14.2 versions prior to 14.2R7-S7, 14.2R8; 15.1 versions prior to 15.1F5-S8, 15.1F6-S8, 15.1R5-S6, 15.1R6-S3, 15.1R7; 15.1X49 versions prior to 15.1X49-D100; 15.1X53 versions prior to 15.1X53-D65, 15.1X53-D231; 16.1 versions prior to 16.1R3-S6, 16.1R4-S6, 16.1R5; 16.1X65 versions prior to 16.1X65-D45; 16.2 versions prior to 16.2R2-S1, 16.2R3; 17.1 versions prior to 17.1R2-S2, 17.1R3; 17.2 versions prior to 17.2R1-S3, 17.2R2; 17.2X75 versions prior to 17.2X75-D50."
|
| 5 |
+
CVE-2018-0004,"A sustained sequence of normal transit traffic can lead to a high CPU consumption denial of service condition in Junos OS, potentially making the device inaccessible.",10/01/2018,19/01/2018,"JSA10832,�SECTRACK:1040183","Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D50; 12.3X48 versions prior to 12.3X48-D30; 12.3R versions prior to 12.3R12-S7; 14.1 versions prior to 14.1R8-S4, 14.1R9; 14.1X53 versions prior to 14.1X53-D30, 14.1X53-D34; 14.2 versions prior to 14.2R8; 15.1 versions prior to 15.1F6, 15.1R3; 15.1X49 versions prior to 15.1X49-D40; 15.1X53 versions prior to 15.1X53-D31, 15.1X53-D33, 15.1X53-D60."
|