In [ ]:
In [61]:
import gzip
with open ("../demos/dataset/nvdcve-1.0-2016_short.json", "rt", encoding='utf-8') as json_file:
json_content = json_file.read()
json_content[:100]
Out[61]:
'{\n "CVE_data_type" : "CVE",\n "CVE_data_format" : "MITRE",\n "CVE_data_version" : "4.0",\n "CVE_dat'
In [107]:
json_data = json.loads(json_content)
json_data
Out[107]:
{'CVE_Items': [{'configurations': {'CVE_data_version': '4.0',
'nodes': [{'cpe_match': [{'cpe23Uri': 'cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*',
'vulnerable': True}],
'operator': 'OR'}]},
'cve': {'CVE_data_meta': {'ASSIGNER': 'cve@mitre.org',
'ID': 'CVE-2016-0003'},
'affects': {'vendor': {'vendor_data': [{'product': {'product_data': [{'product_name': 'edge',
'version': {'version_data': [{'version_affected': '=',
'version_value': '-'}]}}]},
'vendor_name': 'microsoft'}]}},
'data_format': 'MITRE',
'data_type': 'CVE',
'data_version': '4.0',
'description': {'description_data': [{'lang': 'en',
'value': 'Microsoft Edge allows remote attackers to execute arbitrary code via unspecified vectors, aka "Microsoft Edge Memory Corruption Vulnerability."'}]},
'problemtype': {'problemtype_data': [{'description': [{'lang': 'en',
'value': 'CWE-119'}]}]},
'references': {'reference_data': [{'name': '1034649',
'refsource': 'SECTRACK',
'tags': [],
'url': 'http://www.securitytracker.com/id/1034649'},
{'name': 'http://www.zerodayinitiative.com/advisories/ZDI-16-019',
'refsource': 'MISC',
'tags': [],
'url': 'http://www.zerodayinitiative.com/advisories/ZDI-16-019'},
{'name': 'MS16-002',
'refsource': 'MS',
'tags': [],
'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-002'}]}},
'impact': {'baseMetricV2': {'cvssV2': {'accessComplexity': 'MEDIUM',
'accessVector': 'NETWORK',
'authentication': 'NONE',
'availabilityImpact': 'COMPLETE',
'baseScore': 9.3,
'confidentialityImpact': 'COMPLETE',
'integrityImpact': 'COMPLETE',
'vectorString': 'AV:N/AC:M/Au:N/C:C/I:C/A:C',
'version': '2.0'},
'exploitabilityScore': 8.6,
'impactScore': 10.0,
'obtainAllPrivilege': False,
'obtainOtherPrivilege': False,
'obtainUserPrivilege': False,
'severity': 'HIGH',
'userInteractionRequired': True},
'baseMetricV3': {'cvssV3': {'attackComplexity': 'LOW',
'attackVector': 'NETWORK',
'availabilityImpact': 'HIGH',
'baseScore': 9.6,
'baseSeverity': 'CRITICAL',
'confidentialityImpact': 'HIGH',
'integrityImpact': 'HIGH',
'privilegesRequired': 'NONE',
'scope': 'CHANGED',
'userInteraction': 'REQUIRED',
'vectorString': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H',
'version': '3.0'},
'exploitabilityScore': 2.8,
'impactScore': 6.0}},
'lastModifiedDate': '2018-10-12T22:10Z',
'publishedDate': '2016-01-13T05:59Z'},
{'configurations': {'CVE_data_version': '4.0', 'nodes': []},
'cve': {'CVE_data_meta': {'ASSIGNER': 'cve@mitre.org',
'ID': 'CVE-2016-0004'},
'affects': {'vendor': {'vendor_data': []}},
'data_format': 'MITRE',
'data_type': 'CVE',
'data_version': '4.0',
'description': {'description_data': [{'lang': 'en',
'value': '** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none.'}]},
'problemtype': {'problemtype_data': [{'description': []}]},
'references': {'reference_data': []}},
'impact': {},
'lastModifiedDate': '2017-05-11T14:29Z',
'publishedDate': '2017-05-11T14:29Z'},
{'configurations': {'CVE_data_version': '4.0',
'nodes': [{'cpe_match': [{'cpe23Uri': 'cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*',
'vulnerable': True},
{'cpe23Uri': 'cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*',
'vulnerable': True},
{'cpe23Uri': 'cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*',
'vulnerable': True}],
'operator': 'OR'}]},
'cve': {'CVE_data_meta': {'ASSIGNER': 'cve@mitre.org',
'ID': 'CVE-2016-0005'},
'affects': {'vendor': {'vendor_data': [{'product': {'product_data': [{'product_name': 'internet_explorer',
'version': {'version_data': [{'version_affected': '=',
'version_value': '9'},
{'version_affected': '=', 'version_value': '10'},
{'version_affected': '=', 'version_value': '11'}]}}]},
'vendor_name': 'microsoft'}]}},
'data_format': 'MITRE',
'data_type': 'CVE',
'data_version': '4.0',
'description': {'description_data': [{'lang': 'en',
'value': 'Microsoft Internet Explorer 9 through 11 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, aka "Internet Explorer Elevation of Privilege Vulnerability."'}]},
'problemtype': {'problemtype_data': [{'description': [{'lang': 'en',
'value': 'CWE-20'}]}]},
'references': {'reference_data': [{'name': '1034648',
'refsource': 'SECTRACK',
'tags': [],
'url': 'http://www.securitytracker.com/id/1034648'},
{'name': 'MS16-001',
'refsource': 'MS',
'tags': [],
'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-001'}]}},
'impact': {'baseMetricV2': {'cvssV2': {'accessComplexity': 'MEDIUM',
'accessVector': 'NETWORK',
'authentication': 'NONE',
'availabilityImpact': 'NONE',
'baseScore': 4.3,
'confidentialityImpact': 'NONE',
'integrityImpact': 'PARTIAL',
'vectorString': 'AV:N/AC:M/Au:N/C:N/I:P/A:N',
'version': '2.0'},
'exploitabilityScore': 8.6,
'impactScore': 2.9,
'obtainAllPrivilege': False,
'obtainOtherPrivilege': False,
'obtainUserPrivilege': False,
'severity': 'MEDIUM',
'userInteractionRequired': True},
'baseMetricV3': {'cvssV3': {'attackComplexity': 'LOW',
'attackVector': 'NETWORK',
'availabilityImpact': 'NONE',
'baseScore': 4.3,
'baseSeverity': 'MEDIUM',
'confidentialityImpact': 'NONE',
'integrityImpact': 'LOW',
'privilegesRequired': 'NONE',
'scope': 'UNCHANGED',
'userInteraction': 'REQUIRED',
'vectorString': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N',
'version': '3.0'},
'exploitabilityScore': 2.8,
'impactScore': 1.4}},
'lastModifiedDate': '2018-10-12T22:10Z',
'publishedDate': '2016-01-13T05:59Z'}],
'CVE_data_format': 'MITRE',
'CVE_data_numberOfCVEs': '9852',
'CVE_data_timestamp': '2018-11-07T08:18Z',
'CVE_data_type': 'CVE',
'CVE_data_version': '4.0'}
In [148]:
result = json_normalize(
data[0]['CVE_Items'],'cve.affects', errors='ignore')
result
---------------------------------------------------------------------------
KeyError Traceback (most recent call last)
<ipython-input-148-6667e7d58a22> in <module>()
1 result = json_normalize(
2 data[0]['CVE_Items'],
----> 3 'cve.affects', errors='ignore')
4 result
C:\dev\apps\Anaconda3\lib\site-packages\pandas\io\json\normalize.py in json_normalize(data, record_path, meta, meta_prefix, record_prefix, errors, sep)
254 records.extend(recs)
255
--> 256 _recursive_extract(data, record_path, {}, level=0)
257
258 result = DataFrame(records)
C:\dev\apps\Anaconda3\lib\site-packages\pandas\io\json\normalize.py in _recursive_extract(data, path, seen_meta, level)
230 else:
231 for obj in data:
--> 232 recs = _pull_field(obj, path[0])
233
234 # For repeating the metadata later
C:\dev\apps\Anaconda3\lib\site-packages\pandas\io\json\normalize.py in _pull_field(js, spec)
178 result = result[field]
179 else:
--> 180 result = result[spec]
181
182 return result
KeyError: 'cve.affects'
In [114]:
from pandas.io.json import json_normalize
import json
data = json.loads("[" + json_content + "]")
data
Out[114]:
[{'CVE_Items': [{'configurations': {'CVE_data_version': '4.0',
'nodes': [{'cpe_match': [{'cpe23Uri': 'cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*',
'vulnerable': True}],
'operator': 'OR'}]},
'cve': {'CVE_data_meta': {'ASSIGNER': 'cve@mitre.org',
'ID': 'CVE-2016-0003'},
'affects': {'vendor': {'vendor_data': [{'product': {'product_data': [{'product_name': 'edge',
'version': {'version_data': [{'version_affected': '=',
'version_value': '-'}]}}]},
'vendor_name': 'microsoft'}]}},
'data_format': 'MITRE',
'data_type': 'CVE',
'data_version': '4.0',
'description': {'description_data': [{'lang': 'en',
'value': 'Microsoft Edge allows remote attackers to execute arbitrary code via unspecified vectors, aka "Microsoft Edge Memory Corruption Vulnerability."'}]},
'problemtype': {'problemtype_data': [{'description': [{'lang': 'en',
'value': 'CWE-119'}]}]},
'references': {'reference_data': [{'name': '1034649',
'refsource': 'SECTRACK',
'tags': [],
'url': 'http://www.securitytracker.com/id/1034649'},
{'name': 'http://www.zerodayinitiative.com/advisories/ZDI-16-019',
'refsource': 'MISC',
'tags': [],
'url': 'http://www.zerodayinitiative.com/advisories/ZDI-16-019'},
{'name': 'MS16-002',
'refsource': 'MS',
'tags': [],
'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-002'}]}},
'impact': {'baseMetricV2': {'cvssV2': {'accessComplexity': 'MEDIUM',
'accessVector': 'NETWORK',
'authentication': 'NONE',
'availabilityImpact': 'COMPLETE',
'baseScore': 9.3,
'confidentialityImpact': 'COMPLETE',
'integrityImpact': 'COMPLETE',
'vectorString': 'AV:N/AC:M/Au:N/C:C/I:C/A:C',
'version': '2.0'},
'exploitabilityScore': 8.6,
'impactScore': 10.0,
'obtainAllPrivilege': False,
'obtainOtherPrivilege': False,
'obtainUserPrivilege': False,
'severity': 'HIGH',
'userInteractionRequired': True},
'baseMetricV3': {'cvssV3': {'attackComplexity': 'LOW',
'attackVector': 'NETWORK',
'availabilityImpact': 'HIGH',
'baseScore': 9.6,
'baseSeverity': 'CRITICAL',
'confidentialityImpact': 'HIGH',
'integrityImpact': 'HIGH',
'privilegesRequired': 'NONE',
'scope': 'CHANGED',
'userInteraction': 'REQUIRED',
'vectorString': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H',
'version': '3.0'},
'exploitabilityScore': 2.8,
'impactScore': 6.0}},
'lastModifiedDate': '2018-10-12T22:10Z',
'publishedDate': '2016-01-13T05:59Z'},
{'configurations': {'CVE_data_version': '4.0', 'nodes': []},
'cve': {'CVE_data_meta': {'ASSIGNER': 'cve@mitre.org',
'ID': 'CVE-2016-0004'},
'affects': {'vendor': {'vendor_data': []}},
'data_format': 'MITRE',
'data_type': 'CVE',
'data_version': '4.0',
'description': {'description_data': [{'lang': 'en',
'value': '** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none.'}]},
'problemtype': {'problemtype_data': [{'description': []}]},
'references': {'reference_data': []}},
'impact': {},
'lastModifiedDate': '2017-05-11T14:29Z',
'publishedDate': '2017-05-11T14:29Z'},
{'configurations': {'CVE_data_version': '4.0',
'nodes': [{'cpe_match': [{'cpe23Uri': 'cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*',
'vulnerable': True},
{'cpe23Uri': 'cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*',
'vulnerable': True},
{'cpe23Uri': 'cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*',
'vulnerable': True}],
'operator': 'OR'}]},
'cve': {'CVE_data_meta': {'ASSIGNER': 'cve@mitre.org',
'ID': 'CVE-2016-0005'},
'affects': {'vendor': {'vendor_data': [{'product': {'product_data': [{'product_name': 'internet_explorer',
'version': {'version_data': [{'version_affected': '=',
'version_value': '9'},
{'version_affected': '=', 'version_value': '10'},
{'version_affected': '=', 'version_value': '11'}]}}]},
'vendor_name': 'microsoft'}]}},
'data_format': 'MITRE',
'data_type': 'CVE',
'data_version': '4.0',
'description': {'description_data': [{'lang': 'en',
'value': 'Microsoft Internet Explorer 9 through 11 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, aka "Internet Explorer Elevation of Privilege Vulnerability."'}]},
'problemtype': {'problemtype_data': [{'description': [{'lang': 'en',
'value': 'CWE-20'}]}]},
'references': {'reference_data': [{'name': '1034648',
'refsource': 'SECTRACK',
'tags': [],
'url': 'http://www.securitytracker.com/id/1034648'},
{'name': 'MS16-001',
'refsource': 'MS',
'tags': [],
'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-001'}]}},
'impact': {'baseMetricV2': {'cvssV2': {'accessComplexity': 'MEDIUM',
'accessVector': 'NETWORK',
'authentication': 'NONE',
'availabilityImpact': 'NONE',
'baseScore': 4.3,
'confidentialityImpact': 'NONE',
'integrityImpact': 'PARTIAL',
'vectorString': 'AV:N/AC:M/Au:N/C:N/I:P/A:N',
'version': '2.0'},
'exploitabilityScore': 8.6,
'impactScore': 2.9,
'obtainAllPrivilege': False,
'obtainOtherPrivilege': False,
'obtainUserPrivilege': False,
'severity': 'MEDIUM',
'userInteractionRequired': True},
'baseMetricV3': {'cvssV3': {'attackComplexity': 'LOW',
'attackVector': 'NETWORK',
'availabilityImpact': 'NONE',
'baseScore': 4.3,
'baseSeverity': 'MEDIUM',
'confidentialityImpact': 'NONE',
'integrityImpact': 'LOW',
'privilegesRequired': 'NONE',
'scope': 'UNCHANGED',
'userInteraction': 'REQUIRED',
'vectorString': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N',
'version': '3.0'},
'exploitabilityScore': 2.8,
'impactScore': 1.4}},
'lastModifiedDate': '2018-10-12T22:10Z',
'publishedDate': '2016-01-13T05:59Z'}],
'CVE_data_format': 'MITRE',
'CVE_data_numberOfCVEs': '9852',
'CVE_data_timestamp': '2018-11-07T08:18Z',
'CVE_data_type': 'CVE',
'CVE_data_version': '4.0'}]
In [115]:
def flatten_json(y):
out = {}
def flatten(x, name=''):
if type(x) is dict:
for a in x:
flatten(x[a], name + a + '_')
elif type(x) is list:
i = 0
for a in x:
flatten(a, name + str(i) + '_')
i += 1
else:
out[name[:-1]] = x
flatten(y)
return out
In [104]:
flattened_data = flatten_json(data)
cve = json_normalize(flattened_data)
cve.T
Out[104]:
0
CVE_Items_0_configurations_CVE_data_version
4.0
CVE_Items_0_configurations_nodes_0_cpe_match_0_cpe23Uri
cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*
CVE_Items_0_configurations_nodes_0_cpe_match_0_vulnerable
True
CVE_Items_0_configurations_nodes_0_operator
OR
CVE_Items_0_cve_CVE_data_meta_ASSIGNER
cve@mitre.org
CVE_Items_0_cve_CVE_data_meta_ID
CVE-2016-0003
CVE_Items_0_cve_affects_vendor_vendor_data_0_product_product_data_0_product_name
edge
CVE_Items_0_cve_affects_vendor_vendor_data_0_product_product_data_0_version_version_data_0_version_affected
=
CVE_Items_0_cve_affects_vendor_vendor_data_0_product_product_data_0_version_version_data_0_version_value
-
CVE_Items_0_cve_affects_vendor_vendor_data_0_vendor_name
microsoft
CVE_Items_0_cve_data_format
MITRE
CVE_Items_0_cve_data_type
CVE
CVE_Items_0_cve_data_version
4.0
CVE_Items_0_cve_description_description_data_0_lang
en
CVE_Items_0_cve_description_description_data_0_value
Microsoft Edge allows remote attackers to exec...
CVE_Items_0_cve_problemtype_problemtype_data_0_description_0_lang
en
CVE_Items_0_cve_problemtype_problemtype_data_0_description_0_value
CWE-119
CVE_Items_0_cve_references_reference_data_0_name
1034649
CVE_Items_0_cve_references_reference_data_0_refsource
SECTRACK
CVE_Items_0_cve_references_reference_data_0_url
http://www.securitytracker.com/id/1034649
CVE_Items_0_cve_references_reference_data_1_name
http://www.zerodayinitiative.com/advisories/ZD...
CVE_Items_0_cve_references_reference_data_1_refsource
MISC
CVE_Items_0_cve_references_reference_data_1_url
http://www.zerodayinitiative.com/advisories/ZD...
CVE_Items_0_cve_references_reference_data_2_name
MS16-002
CVE_Items_0_cve_references_reference_data_2_refsource
MS
CVE_Items_0_cve_references_reference_data_2_url
https://docs.microsoft.com/en-us/security-upda...
CVE_Items_0_impact_baseMetricV2_cvssV2_accessComplexity
MEDIUM
CVE_Items_0_impact_baseMetricV2_cvssV2_accessVector
NETWORK
CVE_Items_0_impact_baseMetricV2_cvssV2_authentication
NONE
CVE_Items_0_impact_baseMetricV2_cvssV2_availabilityImpact
COMPLETE
...
...
CVE_Items_2_impact_baseMetricV2_cvssV2_vectorString
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVE_Items_2_impact_baseMetricV2_cvssV2_version
2.0
CVE_Items_2_impact_baseMetricV2_exploitabilityScore
8.6
CVE_Items_2_impact_baseMetricV2_impactScore
2.9
CVE_Items_2_impact_baseMetricV2_obtainAllPrivilege
False
CVE_Items_2_impact_baseMetricV2_obtainOtherPrivilege
False
CVE_Items_2_impact_baseMetricV2_obtainUserPrivilege
False
CVE_Items_2_impact_baseMetricV2_severity
MEDIUM
CVE_Items_2_impact_baseMetricV2_userInteractionRequired
True
CVE_Items_2_impact_baseMetricV3_cvssV3_attackComplexity
LOW
CVE_Items_2_impact_baseMetricV3_cvssV3_attackVector
NETWORK
CVE_Items_2_impact_baseMetricV3_cvssV3_availabilityImpact
NONE
CVE_Items_2_impact_baseMetricV3_cvssV3_baseScore
4.3
CVE_Items_2_impact_baseMetricV3_cvssV3_baseSeverity
MEDIUM
CVE_Items_2_impact_baseMetricV3_cvssV3_confidentialityImpact
NONE
CVE_Items_2_impact_baseMetricV3_cvssV3_integrityImpact
LOW
CVE_Items_2_impact_baseMetricV3_cvssV3_privilegesRequired
NONE
CVE_Items_2_impact_baseMetricV3_cvssV3_scope
UNCHANGED
CVE_Items_2_impact_baseMetricV3_cvssV3_userInteraction
REQUIRED
CVE_Items_2_impact_baseMetricV3_cvssV3_vectorString
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
CVE_Items_2_impact_baseMetricV3_cvssV3_version
3.0
CVE_Items_2_impact_baseMetricV3_exploitabilityScore
2.8
CVE_Items_2_impact_baseMetricV3_impactScore
1.4
CVE_Items_2_lastModifiedDate
2018-10-12T22:10Z
CVE_Items_2_publishedDate
2016-01-13T05:59Z
CVE_data_format
MITRE
CVE_data_numberOfCVEs
9852
CVE_data_timestamp
2018-11-07T08:18Z
CVE_data_type
CVE
CVE_data_version
4.0
136 rows × 1 columns
In [2]:
import pandas as pd
cve = pd.read_json("../demos/dataset/nvdcve-1.0-2016.json.gz")
cve
Out[2]:
CVE_Items
CVE_data_format
CVE_data_numberOfCVEs
CVE_data_timestamp
CVE_data_type
CVE_data_version
0
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
1
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
2
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
3
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
4
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
5
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
6
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
7
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
8
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
9
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
10
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
11
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
12
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
13
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
14
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
15
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
16
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
17
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
18
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
19
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
20
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
21
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
22
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
23
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
24
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
25
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
26
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
27
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
28
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
29
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
...
...
...
...
...
...
...
9822
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
9823
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
9824
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
9825
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
9826
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
9827
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
9828
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
9829
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
9830
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
9831
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
9832
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
9833
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
9834
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
9835
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
9836
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
9837
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
9838
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
9839
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
9840
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
9841
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
9842
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
9843
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
9844
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
9845
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
9846
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
9847
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
9848
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
9849
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
9850
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
9851
{'cve': {'data_type': 'CVE', 'data_format': 'M...
MITRE
9852
2018-11-07T08:18Z
CVE
4
9852 rows × 6 columns
Content source: feststelltaste/software-analytics
Similar notebooks: