import gzip
with open ("../demos/dataset/nvdcve-1.0-2016_short.json", "rt", encoding='utf-8') as json_file:
json_content = json_file.read()
json_content[:100]
'{\n "CVE_data_type" : "CVE",\n "CVE_data_format" : "MITRE",\n "CVE_data_version" : "4.0",\n "CVE_dat'
json_data = json.loads(json_content)
json_data
{'CVE_Items': [{'configurations': {'CVE_data_version': '4.0', 'nodes': [{'cpe_match': [{'cpe23Uri': 'cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*', 'vulnerable': True}], 'operator': 'OR'}]}, 'cve': {'CVE_data_meta': {'ASSIGNER': 'cve@mitre.org', 'ID': 'CVE-2016-0003'}, 'affects': {'vendor': {'vendor_data': [{'product': {'product_data': [{'product_name': 'edge', 'version': {'version_data': [{'version_affected': '=', 'version_value': '-'}]}}]}, 'vendor_name': 'microsoft'}]}}, 'data_format': 'MITRE', 'data_type': 'CVE', 'data_version': '4.0', 'description': {'description_data': [{'lang': 'en', 'value': 'Microsoft Edge allows remote attackers to execute arbitrary code via unspecified vectors, aka "Microsoft Edge Memory Corruption Vulnerability."'}]}, 'problemtype': {'problemtype_data': [{'description': [{'lang': 'en', 'value': 'CWE-119'}]}]}, 'references': {'reference_data': [{'name': '1034649', 'refsource': 'SECTRACK', 'tags': [], 'url': 'http://www.securitytracker.com/id/1034649'}, {'name': 'http://www.zerodayinitiative.com/advisories/ZDI-16-019', 'refsource': 'MISC', 'tags': [], 'url': 'http://www.zerodayinitiative.com/advisories/ZDI-16-019'}, {'name': 'MS16-002', 'refsource': 'MS', 'tags': [], 'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-002'}]}}, 'impact': {'baseMetricV2': {'cvssV2': {'accessComplexity': 'MEDIUM', 'accessVector': 'NETWORK', 'authentication': 'NONE', 'availabilityImpact': 'COMPLETE', 'baseScore': 9.3, 'confidentialityImpact': 'COMPLETE', 'integrityImpact': 'COMPLETE', 'vectorString': 'AV:N/AC:M/Au:N/C:C/I:C/A:C', 'version': '2.0'}, 'exploitabilityScore': 8.6, 'impactScore': 10.0, 'obtainAllPrivilege': False, 'obtainOtherPrivilege': False, 'obtainUserPrivilege': False, 'severity': 'HIGH', 'userInteractionRequired': True}, 'baseMetricV3': {'cvssV3': {'attackComplexity': 'LOW', 'attackVector': 'NETWORK', 'availabilityImpact': 'HIGH', 'baseScore': 9.6, 'baseSeverity': 'CRITICAL', 'confidentialityImpact': 'HIGH', 'integrityImpact': 'HIGH', 'privilegesRequired': 'NONE', 'scope': 'CHANGED', 'userInteraction': 'REQUIRED', 'vectorString': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H', 'version': '3.0'}, 'exploitabilityScore': 2.8, 'impactScore': 6.0}}, 'lastModifiedDate': '2018-10-12T22:10Z', 'publishedDate': '2016-01-13T05:59Z'}, {'configurations': {'CVE_data_version': '4.0', 'nodes': []}, 'cve': {'CVE_data_meta': {'ASSIGNER': 'cve@mitre.org', 'ID': 'CVE-2016-0004'}, 'affects': {'vendor': {'vendor_data': []}}, 'data_format': 'MITRE', 'data_type': 'CVE', 'data_version': '4.0', 'description': {'description_data': [{'lang': 'en', 'value': '** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none.'}]}, 'problemtype': {'problemtype_data': [{'description': []}]}, 'references': {'reference_data': []}}, 'impact': {}, 'lastModifiedDate': '2017-05-11T14:29Z', 'publishedDate': '2017-05-11T14:29Z'}, {'configurations': {'CVE_data_version': '4.0', 'nodes': [{'cpe_match': [{'cpe23Uri': 'cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*', 'vulnerable': True}, {'cpe23Uri': 'cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*', 'vulnerable': True}, {'cpe23Uri': 'cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*', 'vulnerable': True}], 'operator': 'OR'}]}, 'cve': {'CVE_data_meta': {'ASSIGNER': 'cve@mitre.org', 'ID': 'CVE-2016-0005'}, 'affects': {'vendor': {'vendor_data': [{'product': {'product_data': [{'product_name': 'internet_explorer', 'version': {'version_data': [{'version_affected': '=', 'version_value': '9'}, {'version_affected': '=', 'version_value': '10'}, {'version_affected': '=', 'version_value': '11'}]}}]}, 'vendor_name': 'microsoft'}]}}, 'data_format': 'MITRE', 'data_type': 'CVE', 'data_version': '4.0', 'description': {'description_data': [{'lang': 'en', 'value': 'Microsoft Internet Explorer 9 through 11 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, aka "Internet Explorer Elevation of Privilege Vulnerability."'}]}, 'problemtype': {'problemtype_data': [{'description': [{'lang': 'en', 'value': 'CWE-20'}]}]}, 'references': {'reference_data': [{'name': '1034648', 'refsource': 'SECTRACK', 'tags': [], 'url': 'http://www.securitytracker.com/id/1034648'}, {'name': 'MS16-001', 'refsource': 'MS', 'tags': [], 'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-001'}]}}, 'impact': {'baseMetricV2': {'cvssV2': {'accessComplexity': 'MEDIUM', 'accessVector': 'NETWORK', 'authentication': 'NONE', 'availabilityImpact': 'NONE', 'baseScore': 4.3, 'confidentialityImpact': 'NONE', 'integrityImpact': 'PARTIAL', 'vectorString': 'AV:N/AC:M/Au:N/C:N/I:P/A:N', 'version': '2.0'}, 'exploitabilityScore': 8.6, 'impactScore': 2.9, 'obtainAllPrivilege': False, 'obtainOtherPrivilege': False, 'obtainUserPrivilege': False, 'severity': 'MEDIUM', 'userInteractionRequired': True}, 'baseMetricV3': {'cvssV3': {'attackComplexity': 'LOW', 'attackVector': 'NETWORK', 'availabilityImpact': 'NONE', 'baseScore': 4.3, 'baseSeverity': 'MEDIUM', 'confidentialityImpact': 'NONE', 'integrityImpact': 'LOW', 'privilegesRequired': 'NONE', 'scope': 'UNCHANGED', 'userInteraction': 'REQUIRED', 'vectorString': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N', 'version': '3.0'}, 'exploitabilityScore': 2.8, 'impactScore': 1.4}}, 'lastModifiedDate': '2018-10-12T22:10Z', 'publishedDate': '2016-01-13T05:59Z'}], 'CVE_data_format': 'MITRE', 'CVE_data_numberOfCVEs': '9852', 'CVE_data_timestamp': '2018-11-07T08:18Z', 'CVE_data_type': 'CVE', 'CVE_data_version': '4.0'}
result = json_normalize(
data[0]['CVE_Items'],'cve.affects', errors='ignore')
result
--------------------------------------------------------------------------- KeyError Traceback (most recent call last) <ipython-input-148-6667e7d58a22> in <module>() 1 result = json_normalize( 2 data[0]['CVE_Items'], ----> 3 'cve.affects', errors='ignore') 4 result C:\dev\apps\Anaconda3\lib\site-packages\pandas\io\json\normalize.py in json_normalize(data, record_path, meta, meta_prefix, record_prefix, errors, sep) 254 records.extend(recs) 255 --> 256 _recursive_extract(data, record_path, {}, level=0) 257 258 result = DataFrame(records) C:\dev\apps\Anaconda3\lib\site-packages\pandas\io\json\normalize.py in _recursive_extract(data, path, seen_meta, level) 230 else: 231 for obj in data: --> 232 recs = _pull_field(obj, path[0]) 233 234 # For repeating the metadata later C:\dev\apps\Anaconda3\lib\site-packages\pandas\io\json\normalize.py in _pull_field(js, spec) 178 result = result[field] 179 else: --> 180 result = result[spec] 181 182 return result KeyError: 'cve.affects'
from pandas.io.json import json_normalize
import json
data = json.loads("[" + json_content + "]")
data
[{'CVE_Items': [{'configurations': {'CVE_data_version': '4.0', 'nodes': [{'cpe_match': [{'cpe23Uri': 'cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*', 'vulnerable': True}], 'operator': 'OR'}]}, 'cve': {'CVE_data_meta': {'ASSIGNER': 'cve@mitre.org', 'ID': 'CVE-2016-0003'}, 'affects': {'vendor': {'vendor_data': [{'product': {'product_data': [{'product_name': 'edge', 'version': {'version_data': [{'version_affected': '=', 'version_value': '-'}]}}]}, 'vendor_name': 'microsoft'}]}}, 'data_format': 'MITRE', 'data_type': 'CVE', 'data_version': '4.0', 'description': {'description_data': [{'lang': 'en', 'value': 'Microsoft Edge allows remote attackers to execute arbitrary code via unspecified vectors, aka "Microsoft Edge Memory Corruption Vulnerability."'}]}, 'problemtype': {'problemtype_data': [{'description': [{'lang': 'en', 'value': 'CWE-119'}]}]}, 'references': {'reference_data': [{'name': '1034649', 'refsource': 'SECTRACK', 'tags': [], 'url': 'http://www.securitytracker.com/id/1034649'}, {'name': 'http://www.zerodayinitiative.com/advisories/ZDI-16-019', 'refsource': 'MISC', 'tags': [], 'url': 'http://www.zerodayinitiative.com/advisories/ZDI-16-019'}, {'name': 'MS16-002', 'refsource': 'MS', 'tags': [], 'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-002'}]}}, 'impact': {'baseMetricV2': {'cvssV2': {'accessComplexity': 'MEDIUM', 'accessVector': 'NETWORK', 'authentication': 'NONE', 'availabilityImpact': 'COMPLETE', 'baseScore': 9.3, 'confidentialityImpact': 'COMPLETE', 'integrityImpact': 'COMPLETE', 'vectorString': 'AV:N/AC:M/Au:N/C:C/I:C/A:C', 'version': '2.0'}, 'exploitabilityScore': 8.6, 'impactScore': 10.0, 'obtainAllPrivilege': False, 'obtainOtherPrivilege': False, 'obtainUserPrivilege': False, 'severity': 'HIGH', 'userInteractionRequired': True}, 'baseMetricV3': {'cvssV3': {'attackComplexity': 'LOW', 'attackVector': 'NETWORK', 'availabilityImpact': 'HIGH', 'baseScore': 9.6, 'baseSeverity': 'CRITICAL', 'confidentialityImpact': 'HIGH', 'integrityImpact': 'HIGH', 'privilegesRequired': 'NONE', 'scope': 'CHANGED', 'userInteraction': 'REQUIRED', 'vectorString': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H', 'version': '3.0'}, 'exploitabilityScore': 2.8, 'impactScore': 6.0}}, 'lastModifiedDate': '2018-10-12T22:10Z', 'publishedDate': '2016-01-13T05:59Z'}, {'configurations': {'CVE_data_version': '4.0', 'nodes': []}, 'cve': {'CVE_data_meta': {'ASSIGNER': 'cve@mitre.org', 'ID': 'CVE-2016-0004'}, 'affects': {'vendor': {'vendor_data': []}}, 'data_format': 'MITRE', 'data_type': 'CVE', 'data_version': '4.0', 'description': {'description_data': [{'lang': 'en', 'value': '** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none.'}]}, 'problemtype': {'problemtype_data': [{'description': []}]}, 'references': {'reference_data': []}}, 'impact': {}, 'lastModifiedDate': '2017-05-11T14:29Z', 'publishedDate': '2017-05-11T14:29Z'}, {'configurations': {'CVE_data_version': '4.0', 'nodes': [{'cpe_match': [{'cpe23Uri': 'cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*', 'vulnerable': True}, {'cpe23Uri': 'cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*', 'vulnerable': True}, {'cpe23Uri': 'cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*', 'vulnerable': True}], 'operator': 'OR'}]}, 'cve': {'CVE_data_meta': {'ASSIGNER': 'cve@mitre.org', 'ID': 'CVE-2016-0005'}, 'affects': {'vendor': {'vendor_data': [{'product': {'product_data': [{'product_name': 'internet_explorer', 'version': {'version_data': [{'version_affected': '=', 'version_value': '9'}, {'version_affected': '=', 'version_value': '10'}, {'version_affected': '=', 'version_value': '11'}]}}]}, 'vendor_name': 'microsoft'}]}}, 'data_format': 'MITRE', 'data_type': 'CVE', 'data_version': '4.0', 'description': {'description_data': [{'lang': 'en', 'value': 'Microsoft Internet Explorer 9 through 11 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, aka "Internet Explorer Elevation of Privilege Vulnerability."'}]}, 'problemtype': {'problemtype_data': [{'description': [{'lang': 'en', 'value': 'CWE-20'}]}]}, 'references': {'reference_data': [{'name': '1034648', 'refsource': 'SECTRACK', 'tags': [], 'url': 'http://www.securitytracker.com/id/1034648'}, {'name': 'MS16-001', 'refsource': 'MS', 'tags': [], 'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-001'}]}}, 'impact': {'baseMetricV2': {'cvssV2': {'accessComplexity': 'MEDIUM', 'accessVector': 'NETWORK', 'authentication': 'NONE', 'availabilityImpact': 'NONE', 'baseScore': 4.3, 'confidentialityImpact': 'NONE', 'integrityImpact': 'PARTIAL', 'vectorString': 'AV:N/AC:M/Au:N/C:N/I:P/A:N', 'version': '2.0'}, 'exploitabilityScore': 8.6, 'impactScore': 2.9, 'obtainAllPrivilege': False, 'obtainOtherPrivilege': False, 'obtainUserPrivilege': False, 'severity': 'MEDIUM', 'userInteractionRequired': True}, 'baseMetricV3': {'cvssV3': {'attackComplexity': 'LOW', 'attackVector': 'NETWORK', 'availabilityImpact': 'NONE', 'baseScore': 4.3, 'baseSeverity': 'MEDIUM', 'confidentialityImpact': 'NONE', 'integrityImpact': 'LOW', 'privilegesRequired': 'NONE', 'scope': 'UNCHANGED', 'userInteraction': 'REQUIRED', 'vectorString': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N', 'version': '3.0'}, 'exploitabilityScore': 2.8, 'impactScore': 1.4}}, 'lastModifiedDate': '2018-10-12T22:10Z', 'publishedDate': '2016-01-13T05:59Z'}], 'CVE_data_format': 'MITRE', 'CVE_data_numberOfCVEs': '9852', 'CVE_data_timestamp': '2018-11-07T08:18Z', 'CVE_data_type': 'CVE', 'CVE_data_version': '4.0'}]
def flatten_json(y):
out = {}
def flatten(x, name=''):
if type(x) is dict:
for a in x:
flatten(x[a], name + a + '_')
elif type(x) is list:
i = 0
for a in x:
flatten(a, name + str(i) + '_')
i += 1
else:
out[name[:-1]] = x
flatten(y)
return out
flattened_data = flatten_json(data)
cve = json_normalize(flattened_data)
cve.T
0 | |
---|---|
CVE_Items_0_configurations_CVE_data_version | 4.0 |
CVE_Items_0_configurations_nodes_0_cpe_match_0_cpe23Uri | cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:* |
CVE_Items_0_configurations_nodes_0_cpe_match_0_vulnerable | True |
CVE_Items_0_configurations_nodes_0_operator | OR |
CVE_Items_0_cve_CVE_data_meta_ASSIGNER | cve@mitre.org |
CVE_Items_0_cve_CVE_data_meta_ID | CVE-2016-0003 |
CVE_Items_0_cve_affects_vendor_vendor_data_0_product_product_data_0_product_name | edge |
CVE_Items_0_cve_affects_vendor_vendor_data_0_product_product_data_0_version_version_data_0_version_affected | = |
CVE_Items_0_cve_affects_vendor_vendor_data_0_product_product_data_0_version_version_data_0_version_value | - |
CVE_Items_0_cve_affects_vendor_vendor_data_0_vendor_name | microsoft |
CVE_Items_0_cve_data_format | MITRE |
CVE_Items_0_cve_data_type | CVE |
CVE_Items_0_cve_data_version | 4.0 |
CVE_Items_0_cve_description_description_data_0_lang | en |
CVE_Items_0_cve_description_description_data_0_value | Microsoft Edge allows remote attackers to exec... |
CVE_Items_0_cve_problemtype_problemtype_data_0_description_0_lang | en |
CVE_Items_0_cve_problemtype_problemtype_data_0_description_0_value | CWE-119 |
CVE_Items_0_cve_references_reference_data_0_name | 1034649 |
CVE_Items_0_cve_references_reference_data_0_refsource | SECTRACK |
CVE_Items_0_cve_references_reference_data_0_url | http://www.securitytracker.com/id/1034649 |
CVE_Items_0_cve_references_reference_data_1_name | http://www.zerodayinitiative.com/advisories/ZD... |
CVE_Items_0_cve_references_reference_data_1_refsource | MISC |
CVE_Items_0_cve_references_reference_data_1_url | http://www.zerodayinitiative.com/advisories/ZD... |
CVE_Items_0_cve_references_reference_data_2_name | MS16-002 |
CVE_Items_0_cve_references_reference_data_2_refsource | MS |
CVE_Items_0_cve_references_reference_data_2_url | https://docs.microsoft.com/en-us/security-upda... |
CVE_Items_0_impact_baseMetricV2_cvssV2_accessComplexity | MEDIUM |
CVE_Items_0_impact_baseMetricV2_cvssV2_accessVector | NETWORK |
CVE_Items_0_impact_baseMetricV2_cvssV2_authentication | NONE |
CVE_Items_0_impact_baseMetricV2_cvssV2_availabilityImpact | COMPLETE |
... | ... |
CVE_Items_2_impact_baseMetricV2_cvssV2_vectorString | AV:N/AC:M/Au:N/C:N/I:P/A:N |
CVE_Items_2_impact_baseMetricV2_cvssV2_version | 2.0 |
CVE_Items_2_impact_baseMetricV2_exploitabilityScore | 8.6 |
CVE_Items_2_impact_baseMetricV2_impactScore | 2.9 |
CVE_Items_2_impact_baseMetricV2_obtainAllPrivilege | False |
CVE_Items_2_impact_baseMetricV2_obtainOtherPrivilege | False |
CVE_Items_2_impact_baseMetricV2_obtainUserPrivilege | False |
CVE_Items_2_impact_baseMetricV2_severity | MEDIUM |
CVE_Items_2_impact_baseMetricV2_userInteractionRequired | True |
CVE_Items_2_impact_baseMetricV3_cvssV3_attackComplexity | LOW |
CVE_Items_2_impact_baseMetricV3_cvssV3_attackVector | NETWORK |
CVE_Items_2_impact_baseMetricV3_cvssV3_availabilityImpact | NONE |
CVE_Items_2_impact_baseMetricV3_cvssV3_baseScore | 4.3 |
CVE_Items_2_impact_baseMetricV3_cvssV3_baseSeverity | MEDIUM |
CVE_Items_2_impact_baseMetricV3_cvssV3_confidentialityImpact | NONE |
CVE_Items_2_impact_baseMetricV3_cvssV3_integrityImpact | LOW |
CVE_Items_2_impact_baseMetricV3_cvssV3_privilegesRequired | NONE |
CVE_Items_2_impact_baseMetricV3_cvssV3_scope | UNCHANGED |
CVE_Items_2_impact_baseMetricV3_cvssV3_userInteraction | REQUIRED |
CVE_Items_2_impact_baseMetricV3_cvssV3_vectorString | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N |
CVE_Items_2_impact_baseMetricV3_cvssV3_version | 3.0 |
CVE_Items_2_impact_baseMetricV3_exploitabilityScore | 2.8 |
CVE_Items_2_impact_baseMetricV3_impactScore | 1.4 |
CVE_Items_2_lastModifiedDate | 2018-10-12T22:10Z |
CVE_Items_2_publishedDate | 2016-01-13T05:59Z |
CVE_data_format | MITRE |
CVE_data_numberOfCVEs | 9852 |
CVE_data_timestamp | 2018-11-07T08:18Z |
CVE_data_type | CVE |
CVE_data_version | 4.0 |
136 rows × 1 columns
import pandas as pd
cve = pd.read_json("../demos/dataset/nvdcve-1.0-2016.json.gz")
cve
CVE_Items | CVE_data_format | CVE_data_numberOfCVEs | CVE_data_timestamp | CVE_data_type | CVE_data_version | |
---|---|---|---|---|---|---|
0 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
1 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
2 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
3 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
4 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
5 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
6 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
7 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
8 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
9 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
10 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
11 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
12 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
13 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
14 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
15 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
16 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
17 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
18 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
19 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
20 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
21 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
22 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
23 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
24 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
25 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
26 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
27 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
28 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
29 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
... | ... | ... | ... | ... | ... | ... |
9822 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
9823 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
9824 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
9825 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
9826 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
9827 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
9828 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
9829 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
9830 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
9831 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
9832 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
9833 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
9834 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
9835 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
9836 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
9837 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
9838 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
9839 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
9840 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
9841 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
9842 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
9843 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
9844 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
9845 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
9846 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
9847 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
9848 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
9849 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
9850 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
9851 | {'cve': {'data_type': 'CVE', 'data_format': 'M... | MITRE | 9852 | 2018-11-07T08:18Z | CVE | 4 |
9852 rows × 6 columns