--- viewer: false license: mit language: - en tags: - vulnerabilities - vdb - sca - osv - nvd - ghsa - vers - purl --- This dataset comprises application and OS vulnerabilities aggregated from multiple sources, including OSV, GitHub, NVD, and Linux vendor feeds, in the form of SQLite data files (.vdb6). ## Vulnerability Data sources - Linux [vuln-list](https://github.com/appthreat/vuln-list) - OSV (1) - NVD - GitHub ## Linux distros - AlmaLinux - Debian - Alpine - Amazon Linux - Arch Linux - RHEL/CentOS - Rocky Linux - Ubuntu - OpenSUSE - Photon - Chainguard - Wolfi OS ## Database files The vulnerability database comprises two SQLite database files. - data.index.vdb6 - A smaller index database optimized for quick purl or cpe string searches and vers-based range comparisons. - data.vdb6 - Full CVE source database containing normalized data in CVE 5.1 specification formation and purl prefix. ### cve_index schema ```sql CREATE TABLE if not exists cve_index( cve_id TEXT NOT NULL, type TEXT NOT NULL, namespace TEXT, name TEXT NOT NULL, vers TEXT NOT NULL, purl_prefix TEXT NOT NULL ) ``` ### cve_data schema ```sql CREATE TABLE if not exists cve_data( cve_id TEXT NOT NULL, type TEXT NOT NULL, namespace TEXT, name TEXT NOT NULL, source_data BLOB NOT NULL, override_data BLOB, source_data_hash TEXT NOT NULL, vers TEXT NOT NULL, purl_prefix TEXT NOT NULL ) ``` ## Folders - app - Application vulnerabilities from 2018. Useful for secure code reviews. - app-2y - Application vulnerabilities from 2024. Useful to check for the latest vulnerabilities quickly. - app-10y - Application vulnerabilities from 2014. - app-os - Application and OS vulnerabilities from 2018. Useful for lifecycle analysis and container SBOM scans. - app-os-10y - Application and OS vulnerabilities from 2014. Download data.vdb6 and data.index.vdb6 files from a single folder of your choice. ## Searching for CVEs Use the smaller index database for all search operations. ### Searching by purl Given a purl string (`purl_str`), perform the following steps to convert this into a suitable purl prefix (`purl_prefix`) string: In most cases, a purl prefix is a substring at index 0 after a split by "@". Eg: `purl_prefix = purl_str.split("@")[0]`. A more robust approach: - Parse and validate the string using a suitable [library](https://github.com/package-url/). Retain the parsed purl object (`purl_obj`) - Construct a purl prefix string with the following logic: - Set the value for `purl_prefix` to `"pkg:" + purl_obj["type"]` - If there is a namespace, append it to purl_prefix after the slash character. Eg: `purl_prefix = purl_prefix + "/" + purl_obj['namespace']` - Optional for Linux distros: If there is a qualifier string with the name `distro_name`, append it to the purl_prefix after the slash character. Eg: `purl_prefix = purl_prefix + "/" + purl_obj['qualifiers']['distro_name']` - Append the name after the slash character. Eg: `purl_prefix = purl_prefix + "/" + purl_obj['name']` Use the below SQL query to search by purl_prefix: ``` SELECT DISTINCT cve_id, type, namespace, name, vers, purl_prefix FROM cve_index where purl_prefix = ?; ``` ### Searching by cpe Parse the cpe string to extract the vendor, product, and version. The regex for python is shown below: ```python import re CPE_FULL_REGEX = re.compile( "cpe:?:[^:]+:(?P[^:]+):(?P[^:]+):(?P[^:]+):(?P[^:]+):(?P[^:]+):(?P[^:]+):(?P[^:]+):(?P[^:]+):(?P[^:]+):(?P[^:]+):(?P[^:]+)" ) ``` In the `cve_index` table, vendor maps to namespace and package maps to name. The SQL query is below: ```sql SELECT DISTINCT cve_id, type, namespace, name, vers, purl_prefix FROM cve_index where namespace = ? AND name = ?; ``` ### Comparing version ranges using vers Refer to the vers [documentation](https://github.com/package-url/purl-spec/blob/version-range-spec/VERSION-RANGE-SPEC.rst) for information regarding vers and a logic to parse and check if a version is within a range. To simplify the logic, a value from the vers column in `cve_index` would contain only a maximum of two constraints (one greater than and one lesser than). ## Combining data Search the `cve_index` table in the index database first to retrieve any matching cve_id and purl_prefix values. Use these two column values to retrieve the full CVE source information from the `cve_data` table. An example query is shown below: ```sql SELECT DISTINCT cve_id, type, namespace, name, source_data_hash, json(source_data), json(override_data), vers, purl_prefix FROM cve_data WHERE cve_id = ? AND vers = ? AND purl_prefix = ? GROUP BY purl_prefix ORDER BY cve_id DESC; ``` Use the `source_data_hash` values to filter out any duplicate results for the same CVE. Duplicate results are possible when multiple vers match the same CVE and purl prefixes. ## Citation Use the below citation in your research. ```text @misc{vdb, author = {Team AppThreat}, month = May, title = {{AppThreat vulnerability-db}}, howpublished = {{https://huggingface.co/datasets/AppThreat/vdb}}, year = {2025} } ```