In [ ]:


In [61]:
import gzip

with open ("../demos/dataset/nvdcve-1.0-2016_short.json", "rt", encoding='utf-8') as json_file:
    json_content = json_file.read()
    
json_content[:100]


Out[61]:
'{\n  "CVE_data_type" : "CVE",\n  "CVE_data_format" : "MITRE",\n  "CVE_data_version" : "4.0",\n  "CVE_dat'

In [107]:
json_data = json.loads(json_content)
json_data


Out[107]:
{'CVE_Items': [{'configurations': {'CVE_data_version': '4.0',
    'nodes': [{'cpe_match': [{'cpe23Uri': 'cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*',
        'vulnerable': True}],
      'operator': 'OR'}]},
   'cve': {'CVE_data_meta': {'ASSIGNER': 'cve@mitre.org',
     'ID': 'CVE-2016-0003'},
    'affects': {'vendor': {'vendor_data': [{'product': {'product_data': [{'product_name': 'edge',
           'version': {'version_data': [{'version_affected': '=',
              'version_value': '-'}]}}]},
        'vendor_name': 'microsoft'}]}},
    'data_format': 'MITRE',
    'data_type': 'CVE',
    'data_version': '4.0',
    'description': {'description_data': [{'lang': 'en',
       'value': 'Microsoft Edge allows remote attackers to execute arbitrary code via unspecified vectors, aka "Microsoft Edge Memory Corruption Vulnerability."'}]},
    'problemtype': {'problemtype_data': [{'description': [{'lang': 'en',
         'value': 'CWE-119'}]}]},
    'references': {'reference_data': [{'name': '1034649',
       'refsource': 'SECTRACK',
       'tags': [],
       'url': 'http://www.securitytracker.com/id/1034649'},
      {'name': 'http://www.zerodayinitiative.com/advisories/ZDI-16-019',
       'refsource': 'MISC',
       'tags': [],
       'url': 'http://www.zerodayinitiative.com/advisories/ZDI-16-019'},
      {'name': 'MS16-002',
       'refsource': 'MS',
       'tags': [],
       'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-002'}]}},
   'impact': {'baseMetricV2': {'cvssV2': {'accessComplexity': 'MEDIUM',
      'accessVector': 'NETWORK',
      'authentication': 'NONE',
      'availabilityImpact': 'COMPLETE',
      'baseScore': 9.3,
      'confidentialityImpact': 'COMPLETE',
      'integrityImpact': 'COMPLETE',
      'vectorString': 'AV:N/AC:M/Au:N/C:C/I:C/A:C',
      'version': '2.0'},
     'exploitabilityScore': 8.6,
     'impactScore': 10.0,
     'obtainAllPrivilege': False,
     'obtainOtherPrivilege': False,
     'obtainUserPrivilege': False,
     'severity': 'HIGH',
     'userInteractionRequired': True},
    'baseMetricV3': {'cvssV3': {'attackComplexity': 'LOW',
      'attackVector': 'NETWORK',
      'availabilityImpact': 'HIGH',
      'baseScore': 9.6,
      'baseSeverity': 'CRITICAL',
      'confidentialityImpact': 'HIGH',
      'integrityImpact': 'HIGH',
      'privilegesRequired': 'NONE',
      'scope': 'CHANGED',
      'userInteraction': 'REQUIRED',
      'vectorString': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H',
      'version': '3.0'},
     'exploitabilityScore': 2.8,
     'impactScore': 6.0}},
   'lastModifiedDate': '2018-10-12T22:10Z',
   'publishedDate': '2016-01-13T05:59Z'},
  {'configurations': {'CVE_data_version': '4.0', 'nodes': []},
   'cve': {'CVE_data_meta': {'ASSIGNER': 'cve@mitre.org',
     'ID': 'CVE-2016-0004'},
    'affects': {'vendor': {'vendor_data': []}},
    'data_format': 'MITRE',
    'data_type': 'CVE',
    'data_version': '4.0',
    'description': {'description_data': [{'lang': 'en',
       'value': '** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none.'}]},
    'problemtype': {'problemtype_data': [{'description': []}]},
    'references': {'reference_data': []}},
   'impact': {},
   'lastModifiedDate': '2017-05-11T14:29Z',
   'publishedDate': '2017-05-11T14:29Z'},
  {'configurations': {'CVE_data_version': '4.0',
    'nodes': [{'cpe_match': [{'cpe23Uri': 'cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*',
        'vulnerable': True},
       {'cpe23Uri': 'cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*',
        'vulnerable': True},
       {'cpe23Uri': 'cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*',
        'vulnerable': True}],
      'operator': 'OR'}]},
   'cve': {'CVE_data_meta': {'ASSIGNER': 'cve@mitre.org',
     'ID': 'CVE-2016-0005'},
    'affects': {'vendor': {'vendor_data': [{'product': {'product_data': [{'product_name': 'internet_explorer',
           'version': {'version_data': [{'version_affected': '=',
              'version_value': '9'},
             {'version_affected': '=', 'version_value': '10'},
             {'version_affected': '=', 'version_value': '11'}]}}]},
        'vendor_name': 'microsoft'}]}},
    'data_format': 'MITRE',
    'data_type': 'CVE',
    'data_version': '4.0',
    'description': {'description_data': [{'lang': 'en',
       'value': 'Microsoft Internet Explorer 9 through 11 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, aka "Internet Explorer Elevation of Privilege Vulnerability."'}]},
    'problemtype': {'problemtype_data': [{'description': [{'lang': 'en',
         'value': 'CWE-20'}]}]},
    'references': {'reference_data': [{'name': '1034648',
       'refsource': 'SECTRACK',
       'tags': [],
       'url': 'http://www.securitytracker.com/id/1034648'},
      {'name': 'MS16-001',
       'refsource': 'MS',
       'tags': [],
       'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-001'}]}},
   'impact': {'baseMetricV2': {'cvssV2': {'accessComplexity': 'MEDIUM',
      'accessVector': 'NETWORK',
      'authentication': 'NONE',
      'availabilityImpact': 'NONE',
      'baseScore': 4.3,
      'confidentialityImpact': 'NONE',
      'integrityImpact': 'PARTIAL',
      'vectorString': 'AV:N/AC:M/Au:N/C:N/I:P/A:N',
      'version': '2.0'},
     'exploitabilityScore': 8.6,
     'impactScore': 2.9,
     'obtainAllPrivilege': False,
     'obtainOtherPrivilege': False,
     'obtainUserPrivilege': False,
     'severity': 'MEDIUM',
     'userInteractionRequired': True},
    'baseMetricV3': {'cvssV3': {'attackComplexity': 'LOW',
      'attackVector': 'NETWORK',
      'availabilityImpact': 'NONE',
      'baseScore': 4.3,
      'baseSeverity': 'MEDIUM',
      'confidentialityImpact': 'NONE',
      'integrityImpact': 'LOW',
      'privilegesRequired': 'NONE',
      'scope': 'UNCHANGED',
      'userInteraction': 'REQUIRED',
      'vectorString': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N',
      'version': '3.0'},
     'exploitabilityScore': 2.8,
     'impactScore': 1.4}},
   'lastModifiedDate': '2018-10-12T22:10Z',
   'publishedDate': '2016-01-13T05:59Z'}],
 'CVE_data_format': 'MITRE',
 'CVE_data_numberOfCVEs': '9852',
 'CVE_data_timestamp': '2018-11-07T08:18Z',
 'CVE_data_type': 'CVE',
 'CVE_data_version': '4.0'}

In [148]:
result = json_normalize(
    data[0]['CVE_Items'],'cve.affects', errors='ignore')
result


---------------------------------------------------------------------------
KeyError                                  Traceback (most recent call last)
<ipython-input-148-6667e7d58a22> in <module>()
      1 result = json_normalize(
      2     data[0]['CVE_Items'],
----> 3     'cve.affects', errors='ignore')
      4 result

C:\dev\apps\Anaconda3\lib\site-packages\pandas\io\json\normalize.py in json_normalize(data, record_path, meta, meta_prefix, record_prefix, errors, sep)
    254                 records.extend(recs)
    255 
--> 256     _recursive_extract(data, record_path, {}, level=0)
    257 
    258     result = DataFrame(records)

C:\dev\apps\Anaconda3\lib\site-packages\pandas\io\json\normalize.py in _recursive_extract(data, path, seen_meta, level)
    230         else:
    231             for obj in data:
--> 232                 recs = _pull_field(obj, path[0])
    233 
    234                 # For repeating the metadata later

C:\dev\apps\Anaconda3\lib\site-packages\pandas\io\json\normalize.py in _pull_field(js, spec)
    178                 result = result[field]
    179         else:
--> 180             result = result[spec]
    181 
    182         return result

KeyError: 'cve.affects'

In [114]:
from pandas.io.json import json_normalize
import json

data = json.loads("[" + json_content + "]")
data


Out[114]:
[{'CVE_Items': [{'configurations': {'CVE_data_version': '4.0',
     'nodes': [{'cpe_match': [{'cpe23Uri': 'cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*',
         'vulnerable': True}],
       'operator': 'OR'}]},
    'cve': {'CVE_data_meta': {'ASSIGNER': 'cve@mitre.org',
      'ID': 'CVE-2016-0003'},
     'affects': {'vendor': {'vendor_data': [{'product': {'product_data': [{'product_name': 'edge',
            'version': {'version_data': [{'version_affected': '=',
               'version_value': '-'}]}}]},
         'vendor_name': 'microsoft'}]}},
     'data_format': 'MITRE',
     'data_type': 'CVE',
     'data_version': '4.0',
     'description': {'description_data': [{'lang': 'en',
        'value': 'Microsoft Edge allows remote attackers to execute arbitrary code via unspecified vectors, aka "Microsoft Edge Memory Corruption Vulnerability."'}]},
     'problemtype': {'problemtype_data': [{'description': [{'lang': 'en',
          'value': 'CWE-119'}]}]},
     'references': {'reference_data': [{'name': '1034649',
        'refsource': 'SECTRACK',
        'tags': [],
        'url': 'http://www.securitytracker.com/id/1034649'},
       {'name': 'http://www.zerodayinitiative.com/advisories/ZDI-16-019',
        'refsource': 'MISC',
        'tags': [],
        'url': 'http://www.zerodayinitiative.com/advisories/ZDI-16-019'},
       {'name': 'MS16-002',
        'refsource': 'MS',
        'tags': [],
        'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-002'}]}},
    'impact': {'baseMetricV2': {'cvssV2': {'accessComplexity': 'MEDIUM',
       'accessVector': 'NETWORK',
       'authentication': 'NONE',
       'availabilityImpact': 'COMPLETE',
       'baseScore': 9.3,
       'confidentialityImpact': 'COMPLETE',
       'integrityImpact': 'COMPLETE',
       'vectorString': 'AV:N/AC:M/Au:N/C:C/I:C/A:C',
       'version': '2.0'},
      'exploitabilityScore': 8.6,
      'impactScore': 10.0,
      'obtainAllPrivilege': False,
      'obtainOtherPrivilege': False,
      'obtainUserPrivilege': False,
      'severity': 'HIGH',
      'userInteractionRequired': True},
     'baseMetricV3': {'cvssV3': {'attackComplexity': 'LOW',
       'attackVector': 'NETWORK',
       'availabilityImpact': 'HIGH',
       'baseScore': 9.6,
       'baseSeverity': 'CRITICAL',
       'confidentialityImpact': 'HIGH',
       'integrityImpact': 'HIGH',
       'privilegesRequired': 'NONE',
       'scope': 'CHANGED',
       'userInteraction': 'REQUIRED',
       'vectorString': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H',
       'version': '3.0'},
      'exploitabilityScore': 2.8,
      'impactScore': 6.0}},
    'lastModifiedDate': '2018-10-12T22:10Z',
    'publishedDate': '2016-01-13T05:59Z'},
   {'configurations': {'CVE_data_version': '4.0', 'nodes': []},
    'cve': {'CVE_data_meta': {'ASSIGNER': 'cve@mitre.org',
      'ID': 'CVE-2016-0004'},
     'affects': {'vendor': {'vendor_data': []}},
     'data_format': 'MITRE',
     'data_type': 'CVE',
     'data_version': '4.0',
     'description': {'description_data': [{'lang': 'en',
        'value': '** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none.'}]},
     'problemtype': {'problemtype_data': [{'description': []}]},
     'references': {'reference_data': []}},
    'impact': {},
    'lastModifiedDate': '2017-05-11T14:29Z',
    'publishedDate': '2017-05-11T14:29Z'},
   {'configurations': {'CVE_data_version': '4.0',
     'nodes': [{'cpe_match': [{'cpe23Uri': 'cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*',
         'vulnerable': True},
        {'cpe23Uri': 'cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*',
         'vulnerable': True},
        {'cpe23Uri': 'cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*',
         'vulnerable': True}],
       'operator': 'OR'}]},
    'cve': {'CVE_data_meta': {'ASSIGNER': 'cve@mitre.org',
      'ID': 'CVE-2016-0005'},
     'affects': {'vendor': {'vendor_data': [{'product': {'product_data': [{'product_name': 'internet_explorer',
            'version': {'version_data': [{'version_affected': '=',
               'version_value': '9'},
              {'version_affected': '=', 'version_value': '10'},
              {'version_affected': '=', 'version_value': '11'}]}}]},
         'vendor_name': 'microsoft'}]}},
     'data_format': 'MITRE',
     'data_type': 'CVE',
     'data_version': '4.0',
     'description': {'description_data': [{'lang': 'en',
        'value': 'Microsoft Internet Explorer 9 through 11 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, aka "Internet Explorer Elevation of Privilege Vulnerability."'}]},
     'problemtype': {'problemtype_data': [{'description': [{'lang': 'en',
          'value': 'CWE-20'}]}]},
     'references': {'reference_data': [{'name': '1034648',
        'refsource': 'SECTRACK',
        'tags': [],
        'url': 'http://www.securitytracker.com/id/1034648'},
       {'name': 'MS16-001',
        'refsource': 'MS',
        'tags': [],
        'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-001'}]}},
    'impact': {'baseMetricV2': {'cvssV2': {'accessComplexity': 'MEDIUM',
       'accessVector': 'NETWORK',
       'authentication': 'NONE',
       'availabilityImpact': 'NONE',
       'baseScore': 4.3,
       'confidentialityImpact': 'NONE',
       'integrityImpact': 'PARTIAL',
       'vectorString': 'AV:N/AC:M/Au:N/C:N/I:P/A:N',
       'version': '2.0'},
      'exploitabilityScore': 8.6,
      'impactScore': 2.9,
      'obtainAllPrivilege': False,
      'obtainOtherPrivilege': False,
      'obtainUserPrivilege': False,
      'severity': 'MEDIUM',
      'userInteractionRequired': True},
     'baseMetricV3': {'cvssV3': {'attackComplexity': 'LOW',
       'attackVector': 'NETWORK',
       'availabilityImpact': 'NONE',
       'baseScore': 4.3,
       'baseSeverity': 'MEDIUM',
       'confidentialityImpact': 'NONE',
       'integrityImpact': 'LOW',
       'privilegesRequired': 'NONE',
       'scope': 'UNCHANGED',
       'userInteraction': 'REQUIRED',
       'vectorString': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N',
       'version': '3.0'},
      'exploitabilityScore': 2.8,
      'impactScore': 1.4}},
    'lastModifiedDate': '2018-10-12T22:10Z',
    'publishedDate': '2016-01-13T05:59Z'}],
  'CVE_data_format': 'MITRE',
  'CVE_data_numberOfCVEs': '9852',
  'CVE_data_timestamp': '2018-11-07T08:18Z',
  'CVE_data_type': 'CVE',
  'CVE_data_version': '4.0'}]

In [115]:
def flatten_json(y):
    out = {}

    def flatten(x, name=''):
        if type(x) is dict:
            for a in x:
                flatten(x[a], name + a + '_')
        elif type(x) is list:
            i = 0
            for a in x:
                flatten(a, name + str(i) + '_')
                i += 1
        else:
            out[name[:-1]] = x

    flatten(y)
    return out

In [104]:
flattened_data = flatten_json(data)
cve = json_normalize(flattened_data)
cve.T


Out[104]:
0
CVE_Items_0_configurations_CVE_data_version 4.0
CVE_Items_0_configurations_nodes_0_cpe_match_0_cpe23Uri cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*
CVE_Items_0_configurations_nodes_0_cpe_match_0_vulnerable True
CVE_Items_0_configurations_nodes_0_operator OR
CVE_Items_0_cve_CVE_data_meta_ASSIGNER cve@mitre.org
CVE_Items_0_cve_CVE_data_meta_ID CVE-2016-0003
CVE_Items_0_cve_affects_vendor_vendor_data_0_product_product_data_0_product_name edge
CVE_Items_0_cve_affects_vendor_vendor_data_0_product_product_data_0_version_version_data_0_version_affected =
CVE_Items_0_cve_affects_vendor_vendor_data_0_product_product_data_0_version_version_data_0_version_value -
CVE_Items_0_cve_affects_vendor_vendor_data_0_vendor_name microsoft
CVE_Items_0_cve_data_format MITRE
CVE_Items_0_cve_data_type CVE
CVE_Items_0_cve_data_version 4.0
CVE_Items_0_cve_description_description_data_0_lang en
CVE_Items_0_cve_description_description_data_0_value Microsoft Edge allows remote attackers to exec...
CVE_Items_0_cve_problemtype_problemtype_data_0_description_0_lang en
CVE_Items_0_cve_problemtype_problemtype_data_0_description_0_value CWE-119
CVE_Items_0_cve_references_reference_data_0_name 1034649
CVE_Items_0_cve_references_reference_data_0_refsource SECTRACK
CVE_Items_0_cve_references_reference_data_0_url http://www.securitytracker.com/id/1034649
CVE_Items_0_cve_references_reference_data_1_name http://www.zerodayinitiative.com/advisories/ZD...
CVE_Items_0_cve_references_reference_data_1_refsource MISC
CVE_Items_0_cve_references_reference_data_1_url http://www.zerodayinitiative.com/advisories/ZD...
CVE_Items_0_cve_references_reference_data_2_name MS16-002
CVE_Items_0_cve_references_reference_data_2_refsource MS
CVE_Items_0_cve_references_reference_data_2_url https://docs.microsoft.com/en-us/security-upda...
CVE_Items_0_impact_baseMetricV2_cvssV2_accessComplexity MEDIUM
CVE_Items_0_impact_baseMetricV2_cvssV2_accessVector NETWORK
CVE_Items_0_impact_baseMetricV2_cvssV2_authentication NONE
CVE_Items_0_impact_baseMetricV2_cvssV2_availabilityImpact COMPLETE
... ...
CVE_Items_2_impact_baseMetricV2_cvssV2_vectorString AV:N/AC:M/Au:N/C:N/I:P/A:N
CVE_Items_2_impact_baseMetricV2_cvssV2_version 2.0
CVE_Items_2_impact_baseMetricV2_exploitabilityScore 8.6
CVE_Items_2_impact_baseMetricV2_impactScore 2.9
CVE_Items_2_impact_baseMetricV2_obtainAllPrivilege False
CVE_Items_2_impact_baseMetricV2_obtainOtherPrivilege False
CVE_Items_2_impact_baseMetricV2_obtainUserPrivilege False
CVE_Items_2_impact_baseMetricV2_severity MEDIUM
CVE_Items_2_impact_baseMetricV2_userInteractionRequired True
CVE_Items_2_impact_baseMetricV3_cvssV3_attackComplexity LOW
CVE_Items_2_impact_baseMetricV3_cvssV3_attackVector NETWORK
CVE_Items_2_impact_baseMetricV3_cvssV3_availabilityImpact NONE
CVE_Items_2_impact_baseMetricV3_cvssV3_baseScore 4.3
CVE_Items_2_impact_baseMetricV3_cvssV3_baseSeverity MEDIUM
CVE_Items_2_impact_baseMetricV3_cvssV3_confidentialityImpact NONE
CVE_Items_2_impact_baseMetricV3_cvssV3_integrityImpact LOW
CVE_Items_2_impact_baseMetricV3_cvssV3_privilegesRequired NONE
CVE_Items_2_impact_baseMetricV3_cvssV3_scope UNCHANGED
CVE_Items_2_impact_baseMetricV3_cvssV3_userInteraction REQUIRED
CVE_Items_2_impact_baseMetricV3_cvssV3_vectorString CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
CVE_Items_2_impact_baseMetricV3_cvssV3_version 3.0
CVE_Items_2_impact_baseMetricV3_exploitabilityScore 2.8
CVE_Items_2_impact_baseMetricV3_impactScore 1.4
CVE_Items_2_lastModifiedDate 2018-10-12T22:10Z
CVE_Items_2_publishedDate 2016-01-13T05:59Z
CVE_data_format MITRE
CVE_data_numberOfCVEs 9852
CVE_data_timestamp 2018-11-07T08:18Z
CVE_data_type CVE
CVE_data_version 4.0

136 rows × 1 columns


In [2]:
import pandas as pd

cve = pd.read_json("../demos/dataset/nvdcve-1.0-2016.json.gz")
cve


Out[2]:
CVE_Items CVE_data_format CVE_data_numberOfCVEs CVE_data_timestamp CVE_data_type CVE_data_version
0 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
1 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
2 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
3 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
4 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
5 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
6 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
7 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
8 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
9 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
10 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
11 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
12 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
13 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
14 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
15 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
16 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
17 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
18 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
19 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
20 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
21 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
22 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
23 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
24 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
25 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
26 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
27 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
28 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
29 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
... ... ... ... ... ... ...
9822 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
9823 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
9824 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
9825 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
9826 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
9827 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
9828 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
9829 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
9830 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
9831 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
9832 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
9833 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
9834 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
9835 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
9836 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
9837 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
9838 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
9839 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
9840 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
9841 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
9842 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
9843 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
9844 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
9845 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
9846 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
9847 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
9848 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
9849 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
9850 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4
9851 {'cve': {'data_type': 'CVE', 'data_format': 'M... MITRE 9852 2018-11-07T08:18Z CVE 4

9852 rows × 6 columns