Update README.md
Browse files
README.md
CHANGED
|
@@ -43,12 +43,36 @@ This dataset comprises application and OS vulnerabilities aggregated from multip
|
|
| 43 |
The vulnerability database comprises two SQLite database files.
|
| 44 |
|
| 45 |
- data.index.vdb6 - A smaller index database optimized for quick purl or cpe string searches and vers-based range comparisons.
|
|
|
|
| 46 |
|
| 47 |
-
|
| 48 |
|
| 49 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 50 |
|
| 51 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 52 |
|
| 53 |
## Folders
|
| 54 |
|
|
@@ -112,7 +136,7 @@ Search the `cve_index` table in the index database first to retrieve any matchin
|
|
| 112 |
|
| 113 |
```sql
|
| 114 |
SELECT DISTINCT cve_id, type, namespace, name, source_data_hash, json(source_data), json(override_data), purl_prefix FROM cve_data
|
| 115 |
-
WHERE cve_id = ? AND purl_prefix = ?
|
| 116 |
GROUP BY purl_prefix
|
| 117 |
ORDER BY cve_id DESC;
|
| 118 |
```
|
|
@@ -126,7 +150,7 @@ Use the below citation in your research.
|
|
| 126 |
```text
|
| 127 |
@misc{vdb,
|
| 128 |
author = {Team AppThreat},
|
| 129 |
-
month =
|
| 130 |
title = {{AppThreat vulnerability-db}},
|
| 131 |
howpublished = {{https://huggingface.co/datasets/AppThreat/vdb}},
|
| 132 |
year = {2025}
|
|
|
|
| 43 |
The vulnerability database comprises two SQLite database files.
|
| 44 |
|
| 45 |
- data.index.vdb6 - A smaller index database optimized for quick purl or cpe string searches and vers-based range comparisons.
|
| 46 |
+
- data.vdb6 - Full CVE source database containing normalized data in CVE 5.1 specification formation and purl prefix.
|
| 47 |
|
| 48 |
+
### cve_index schema
|
| 49 |
|
| 50 |
+
```sql
|
| 51 |
+
CREATE TABLE if not exists cve_index(
|
| 52 |
+
cve_id TEXT NOT NULL,
|
| 53 |
+
type TEXT NOT NULL,
|
| 54 |
+
namespace TEXT,
|
| 55 |
+
name TEXT NOT NULL,
|
| 56 |
+
vers TEXT NOT NULL,
|
| 57 |
+
purl_prefix TEXT NOT NULL
|
| 58 |
+
)
|
| 59 |
+
```
|
| 60 |
|
| 61 |
+
### cve_data schema
|
| 62 |
+
|
| 63 |
+
```sql
|
| 64 |
+
CREATE TABLE if not exists cve_data(
|
| 65 |
+
cve_id TEXT NOT NULL,
|
| 66 |
+
type TEXT NOT NULL,
|
| 67 |
+
namespace TEXT,
|
| 68 |
+
name TEXT NOT NULL,
|
| 69 |
+
source_data BLOB NOT NULL,
|
| 70 |
+
override_data BLOB,
|
| 71 |
+
source_data_hash TEXT NOT NULL,
|
| 72 |
+
vers TEXT NOT NULL,
|
| 73 |
+
purl_prefix TEXT NOT NULL
|
| 74 |
+
)
|
| 75 |
+
```
|
| 76 |
|
| 77 |
## Folders
|
| 78 |
|
|
|
|
| 136 |
|
| 137 |
```sql
|
| 138 |
SELECT DISTINCT cve_id, type, namespace, name, source_data_hash, json(source_data), json(override_data), purl_prefix FROM cve_data
|
| 139 |
+
WHERE cve_id = ? AND vers = ? AND purl_prefix = ?
|
| 140 |
GROUP BY purl_prefix
|
| 141 |
ORDER BY cve_id DESC;
|
| 142 |
```
|
|
|
|
| 150 |
```text
|
| 151 |
@misc{vdb,
|
| 152 |
author = {Team AppThreat},
|
| 153 |
+
month = May,
|
| 154 |
title = {{AppThreat vulnerability-db}},
|
| 155 |
howpublished = {{https://huggingface.co/datasets/AppThreat/vdb}},
|
| 156 |
year = {2025}
|