Datasets:
Updated README.md
Browse files
README.md
CHANGED
@@ -1,3 +1,43 @@
|
|
1 |
-
---
|
2 |
-
license: cc0-1.0
|
3 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
---
|
2 |
+
license: cc0-1.0
|
3 |
+
language:
|
4 |
+
- en
|
5 |
+
task_categories:
|
6 |
+
- text-classification
|
7 |
+
tags:
|
8 |
+
- cyber-security
|
9 |
+
- vulnerability
|
10 |
+
- cve
|
11 |
+
- cwe
|
12 |
+
- cvss
|
13 |
+
- nvd
|
14 |
+
- tabular
|
15 |
+
- time-series
|
16 |
+
- risk-analysis
|
17 |
+
pretty_name: NVD CVE & CWE Vulnerability Dataset (1999-2025)
|
18 |
+
size_categories:
|
19 |
+
- 100K<n<1M
|
20 |
+
---
|
21 |
+
|
22 |
+
This collection brings together every Common Vulnerabilities & Exposures (CVE) entry published in the National Vulnerability Database (NVD) from the very first identifier — `CVE-1999-0001` — through all records available on **30 May 2025**.
|
23 |
+
It was built automatically with a **Python** script that calls the **NVD REST API v2.0** page-by-page, handles rate-limits, and **filters data**.
|
24 |
+
|
25 |
+
After download each CVE object is pared down to the essentials and written to **`CVE_CWE_2025.csv`** with the following columns:
|
26 |
+
|
27 |
+
| Column | Meaning |
|
28 |
+
| ------------------------------- | ------------------------------------------------------------------------------------------------------ |
|
29 |
+
| `ID` | Simple row index (starting at 1) |
|
30 |
+
| `CVE-ID` | Official CVE identifier |
|
31 |
+
| `CVSS-V4`, `CVSS-V3`, `CVSS-V2` | Base scores for the three CVSS generations; missing versions are stored as the string `"None"` |
|
32 |
+
| `SEVERITY` | Qualitative severity (e.g. *LOW, MEDIUM, HIGH, CRITICAL*) taken from the newest CVSS version present |
|
33 |
+
| `DESCRIPTION` | Normalised English description from the NVD feed |
|
34 |
+
| `CWE-ID` | Mapped Common Weakness Enumeration code (`CWE-###`) or `NVD-CWE-Other` when no specific mapping exists |
|
35 |
+
|
36 |
+
---
|
37 |
+
|
38 |
+
#### Possible uses
|
39 |
+
|
40 |
+
* **Exploratory analysis** of vulnerability trends over 25 years (e.g. growth of certain CWE classes or shifts in average CVSS score).
|
41 |
+
* **Machine-learning tasks** such as severity or CWE prediction from free-text descriptions.
|
42 |
+
* **Joining with product-specific SBOMs** or asset inventories to assess organisational exposure.
|
43 |
+
* Quick look-ups for **incident response**, education, security research, or reporting dashboards.
|