100+ datasets found
  1. Common IT vulnerabilities and exposures worldwide 2009-2025

    • statista.com
    Updated Nov 28, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Common IT vulnerabilities and exposures worldwide 2009-2025 [Dataset]. https://www.statista.com/statistics/500755/worldwide-common-vulnerabilities-and-exposures/
    Explore at:
    Dataset updated
    Nov 28, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    Worldwide
    Description

    As of August 2024, internet users worldwide discovered around ****** new common IT security vulnerabilities and exposures (CVEs). The highest reported annual figure was recorded in 2023, over ******. Global ransomware threats In the past couple of years, ransomware has become more prominent, becoming the most frequently reported type of cyberattack worldwide in 2023. Additionally, ** percent of organizations worldwide reported experiencing one to three ransomware infections. Among researched markets, France and South Africa were impacted the most. Costly and efficient ransomware families, such as StopCrypt and LockBit, ranked first by detections globally. Additionally, the 2017 WannaCry attack still holds the record as the most impactful ransomware event, causing an estimated **** billion U.S. dollars in damages. Manufacturing and ransomware Manufacturing remains one of the most targeted industries for cyberattacks. In 2023, it was the most vulnerable sector globally to ransomware, experiencing approximately *** incidents worldwide. These attacks were especially prevalent in industrial organizations in North America. Additionally, malware and network or application anomalies were among the most common types of cyber incidents affecting manufacturing organizations.

  2. Global average age in days of cyber vulnerabilities 2024, by severity

    • statista.com
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista, Global average age in days of cyber vulnerabilities 2024, by severity [Dataset]. https://www.statista.com/statistics/1363099/average-age-of-cyber-vulnerability-by-severity/
    Explore at:
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    Oct 2023 - Sep 2024
    Area covered
    Worldwide
    Description

    According to a 2024 study, the average age of cyber vulnerabilities worldwide ranged from 189 to 267 days. Vulnerabilities that were identified as critical were 214.61 days old, and those with high severity were, on average, 189.86 days old. The oldest vulnerabilities were classified as low severity.

  3. CVE, CISA KEV & EPSS Datasets

    • kaggle.com
    zip
    Updated Aug 19, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Francesco (2025). CVE, CISA KEV & EPSS Datasets [Dataset]. https://www.kaggle.com/datasets/francescomanzoni/vulnerability-management-datasets
    Explore at:
    zip(25695173 bytes)Available download formats
    Dataset updated
    Aug 19, 2025
    Authors
    Francesco
    License

    Apache License, v2.0https://www.apache.org/licenses/LICENSE-2.0
    License information was derived automatically

    Description

    This dataset combines vulnerability data from three key sources:

    NVD (National Vulnerability Database): Contains a comprehensive list of publicly known vulnerabilities, including CVE IDs, descriptions, CVSS scores (both v2 and v3), and publication dates. Data includes detailed information on attack vectors, complexity, privileges required, and impact scores.

    CISA (Cybersecurity and Infrastructure Security Agency): Includes a curated list of actively exploited vulnerabilities, highlighting those requiring immediate attention. This provides crucial context for prioritizing remediation efforts.

    Cyentia EPSS: Provides a numerical score (EPSS) reflecting the likelihood of a vulnerability being actively exploited in the wild.

    The dataset is designed for advanced vulnerability analysis. The integrated nature of these data sources enables security professionals and researchers to build models for vulnerability prediction and risk assessment, facilitate more effective security planning, and potentially correlate vulnerability characteristics with exploit activity. The dataset is provided as a CSV file, with appropriate data types assigned to each column for optimal processing in analytical tools like Pandas.

    Data is updated automatically every day.

  4. d

    Data from: Data for Gulf Coast Vulnerability Assessment

    • catalog.data.gov
    • data.usgs.gov
    • +2more
    Updated Nov 26, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    U.S. Geological Survey (2025). Data for Gulf Coast Vulnerability Assessment [Dataset]. https://catalog.data.gov/dataset/data-for-gulf-coast-vulnerability-assessment
    Explore at:
    Dataset updated
    Nov 26, 2025
    Dataset provided by
    United States Geological Surveyhttp://www.usgs.gov/
    Area covered
    Gulf Coast of the United States
    Description

    This USGS Data Release represents geospatial and tabular data for the Gulf Coast Vulnerability Assessment Project. The data release was produced in compliance with the new 'open data' requirements as way to make the scientific products associated with USGS research efforts and publications available to the public. The dataset consists of 2 separate items: 1. Vulnerability assessment data for habitat and species based on expert opinion (Tabular datasets) 2. Vulnerability assessment values for species across subregions in study area (Vector GIS dataset)

  5. d

    Heat Vulnerability Index Rankings

    • catalog.data.gov
    • data.cityofnewyork.us
    • +3more
    Updated Sep 20, 2024
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    data.cityofnewyork.us (2024). Heat Vulnerability Index Rankings [Dataset]. https://catalog.data.gov/dataset/heat-vulnerability-index-rankings
    Explore at:
    Dataset updated
    Sep 20, 2024
    Dataset provided by
    data.cityofnewyork.us
    Description

    The Heat Vulnerability Index (HVI) shows neighborhoods whose residents are more at risk for dying during and immediately following extreme heat. It uses a statistical model to summarize the most important social and environmental factors that contribute to neighborhood heat risk. The factors included in the HVI are surface temperature, green space, access to home air conditioning, and the percentage of residents who are low-income or non-Latinx Black. Differences in these risk factors across neighborhoods are rooted in past and present racism. Neighborhoods are scored from 1 (lowest risk) to 5 (highest risk) by summing the following factors and assigning them into 5 groups (quintiles): Median Household Income (American Community Survey 5 year estimate, 2016-2020) Percent vegetative cover (trees, shrubs or grass) (2017 LiDAR, NYC DOITT) Percent of population reported as Non-Hispanic Black on Census 2020 Average surface temperature Fahrenheit from ECOSSTRESS thermal imaging, August 27,2020 Percent of households reporting Air Conditioning access, Housing ad Vacancy Survey, 2017

  6. Z

    MoreFixes: Largest CVE dataset with fixes

    • data.niaid.nih.gov
    • data-staging.niaid.nih.gov
    • +1more
    Updated Oct 23, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Akhoundali, Jafar; Rahim Nouri, Sajad; Rietveld, Kristian F. D.; GADYATSKAYA, Olga (2024). MoreFixes: Largest CVE dataset with fixes [Dataset]. https://data.niaid.nih.gov/resources?id=zenodo_11199119
    Explore at:
    Dataset updated
    Oct 23, 2024
    Dataset provided by
    Leiden University
    Islamic Azad University, Ramsar
    Authors
    Akhoundali, Jafar; Rahim Nouri, Sajad; Rietveld, Kristian F. D.; GADYATSKAYA, Olga
    License

    MIT Licensehttps://opensource.org/licenses/MIT
    License information was derived automatically

    Description

    In our work, we have designed and implemented a novel workflow with several heuristic methods to combine state-of-the-art methods related to CVE fix commits gathering. As a consequence of our improvements, we have been able to gather the largest programming language-independent real-world dataset of CVE vulnerabilities with the associated fix commits. Our dataset containing 29,203 unique CVEs coming from 7,238 unique GitHub projects is, to the best of our knowledge, by far the biggest CVE vulnerability dataset with fix commits available today. These CVEs are associated with 35,276 unique commits as sql and 39,931 patch commit files that fixed those vulnerabilities(some patch files can't be saved as sql due to several techincal reasons) Our larger dataset thus substantially improves over the current real-world vulnerability datasets and enables further progress in research on vulnerability detection and software security. We used NVD(nvd.nist.gov) and Github Secuirty advisory Database as the main sources of our pipeline.

    We release to the community a 16GB PostgreSQL database that contains information on CVEs up to 2024-09-26, CWEs of each CVE, files and methods changed by each commit, and repository metadata. Additionally, patch files related to the fix commits are available as a separate package. Furthermore, we make our dataset collection tool also available to the community.

    cvedataset-patches.zip file contains fix patches, and postgrescvedumper.sql.zip contains a postgtesql dump of fixes, together with several other fields such as CVEs, CWEs, repository meta-data, commit data, file changes, method changed, etc.

    MoreFixes data-storage strategy is based on CVEFixes to store CVE commits fixes from open-source repositories, and uses a modified version of Porspector(part of ProjectKB from SAP) as a module to detect commit fixes of a CVE. Our full methodology is presented in the paper, with the title of "MoreFixes: A Large-Scale Dataset of CVE Fix Commits Mined through Enhanced Repository Discovery", which will be published in the Promise conference (2024).

    For more information about usage and sample queries, visit the Github repository: https://github.com/JafarAkhondali/Morefixes

    If you are using this dataset, please be aware that the repositories that we mined contain different licenses and you are responsible to handle any licesnsing issues. This is also the similar case with CVEFixes.

    This product uses the NVD API but is not endorsed or certified by the NVD.

    This research was partially supported by the Dutch Research Council (NWO) under the project NWA.1215.18.008 Cyber Security by Integrated Design (C-SIDe).

    To restore the dataset, you can use the docker-compose file available at the gitub repository. Dataset default credentials after restoring dump:

    POSTGRES_USER=postgrescvedumper POSTGRES_DB=postgrescvedumper POSTGRES_PASSWORD=a42a18537d74c3b7e584c769152c3d

    Please use this for citation:

     title={MoreFixes: A large-scale dataset of CVE fix commits mined through enhanced repository discovery},
     author={Akhoundali, Jafar and Nouri, Sajad Rahim and Rietveld, Kristian and Gadyatskaya, Olga},
     booktitle={Proceedings of the 20th International Conference on Predictive Models and Data Analytics in Software Engineering},
     pages={42--51},
     year={2024}
    }
    
  7. Households at risk of asset-based vulnerability - experimental statistics

    • data.europa.eu
    csv, html, tsv, xml
    Updated Jul 2, 2017
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Eurostat (2017). Households at risk of asset-based vulnerability - experimental statistics [Dataset]. https://data.europa.eu/data/datasets/urmgulzfura5tm1go521w?locale=en
    Explore at:
    xml(7378), tsv(5169), xml(7744), html, csv(8051)Available download formats
    Dataset updated
    Jul 2, 2017
    Dataset authored and provided by
    Eurostathttps://ec.europa.eu/eurostat
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Households at risk of asset-based vulnerability - experimental statistics

  8. FPGA Bitstream Vulnerability Dataset

    • kaggle.com
    zip
    Updated Mar 21, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    M Alqarni (2025). FPGA Bitstream Vulnerability Dataset [Dataset]. https://www.kaggle.com/datasets/malqarni/fpga-bitstream-vulnerability-dataset
    Explore at:
    zip(344039 bytes)Available download formats
    Dataset updated
    Mar 21, 2025
    Authors
    M Alqarni
    License

    https://creativecommons.org/publicdomain/zero/1.0/https://creativecommons.org/publicdomain/zero/1.0/

    Description

    The dataset is designed for binary classification, where the task is to predict whether a bitstream is vulnerable (TRUE) or not (FALSE) based on its configuration data (config_data). The vulnerability_type column indicates the type of vulnerability, but since it only contains one type ("Bitstream Modification"), the focus is on distinguishing between vulnerable and non-vulnerable bitstreams. The model's goal is to recognize patterns in the numerical configuration data that correlate with vulnerabilities, making this a binary classification problem.

  9. H

    Extracted Data From: CDC/ATSDR Social Vulnerability Index

    • dataverse.harvard.edu
    Updated Feb 18, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Centers for Disease Control and Prevention and Agency for Toxic Substances and Disease Registry (2025). Extracted Data From: CDC/ATSDR Social Vulnerability Index [Dataset]. http://doi.org/10.7910/DVN/MZF7XQ
    Explore at:
    CroissantCroissant is a format for machine-learning datasets. Learn more about this at mlcommons.org/croissant.
    Dataset updated
    Feb 18, 2025
    Dataset provided by
    Harvard Dataverse
    Authors
    Centers for Disease Control and Prevention and Agency for Toxic Substances and Disease Registry
    License

    CC0 1.0 Universal Public Domain Dedicationhttps://creativecommons.org/publicdomain/zero/1.0/
    License information was derived automatically

    Time period covered
    Jan 1, 2000 - Dec 31, 2000
    Area covered
    United States
    Description

    This submission includes publicly available data extracted in its original form. Please reference the Related Publication listed here for source and citation information If you have questions about the underlying data stored here, please contact the Centers for Disease Control and Prevention and Agency for Toxic Substances and Disease Registry at svi_coordinator@cdc.gov. If you have questions about this metadata entry, please contact the CAFE team at climatecafe@bu.edu. Centers for Disease Control and Prevention/ Agency for Toxic Substances and Disease Registry/ Geospatial Research, Analysis, and Services Program. CDC/ATSDR Social Vulnerability Index [2022, 2020, 2018, 2016, 2014, 2010, and 2000] Database [U.S.]. https://www.atsdr.cdc.gov/placeandhealth/svi/data_documentation_download.html Accessed on 17 December, 2024. "The Centers for Disease Control and Prevention and Agency for Toxic Substances and Disease Registry Social Vulnerability Index (hereafter, CDC/ATSDR SVI or SVI) is a place-based index, database, and mapping application designed to identify and quantify communities experiencing social vulnerability. The Geospatial Research, Analysis & Services Program (GRASP) maintains the CDC/ATSDR SVI to help public health officials and local planners better prepare for and respond to emergency events with the goal of decreasing human suffering, economic loss, and health inequities." [Quote from https://www.atsdr.cdc.gov/place-health/php/svi/]

  10. d

    Data from: CDC Social Vulnerability Index (CDCSVI)

    • catalog.data.gov
    • data.kingcounty.gov
    • +2more
    Updated Apr 22, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    data.kingcounty.gov (2025). CDC Social Vulnerability Index (CDCSVI) [Dataset]. https://catalog.data.gov/dataset/cdc-social-vulnerability-index-cdcsvi
    Explore at:
    Dataset updated
    Apr 22, 2025
    Dataset provided by
    data.kingcounty.gov
    Description

    The Centers for Disease Control Social Vulnerability Index shows which communities are especially at risk during public health emergencies because of factors like socioeconomic status, household composition, racial composition of neighborhoods, or housing type and transportation. The CDC SVI uses 15 U.S. census variables to identify communities that may need support before, during, or after disasters. Learn more here. The condition is the overall ranking of four social theme rankings where lower values indicate high vulnerability and high values indicate low vulnerability. Quintiles for this condition were determined for all the Census tracts in King County. Quintile 1 is the most vulnerable residents, Quintile 5 is the least vulnerable residents. Data is released every 2 years following the American Community Survey release in December of the year following the Survey. The most recent data for 2018 was downloaded from the ATSDR website.

  11. Hydrologic Landscape Vulnerability Assessment Data

    • catalog.data.gov
    • gimi9.com
    • +1more
    Updated May 22, 2021
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    U.S. EPA Office of Research and Development (ORD) (2021). Hydrologic Landscape Vulnerability Assessment Data [Dataset]. https://catalog.data.gov/dataset/hydrologic-landscape-vulnerability-assessment-data
    Explore at:
    Dataset updated
    May 22, 2021
    Dataset provided by
    United States Environmental Protection Agencyhttp://www.epa.gov/
    Description

    JonesEtAl_2021_Study_Locations.shp: This shapefile includes the areas of interest used in our analysis for the analyses published in Jones et al. 2021. Each area of interest is divided into numerous polygonal assessment units as described in the accompanying research article. Each polygon has attributes that include FID, Name, Number (used in our published map figure and tables), and shape area (in meters squared). US_HLScenarioMerge.shp: We apply the hydrologic landscapes (HL) concept to assess the hydrologic vulnerability of the western United States (U.S.) to projected climate conditions. Our goal is to understand the potential impacts for stakeholder-defined interests across large geographic areas. The basic assumption of the HL approach is that catchments that share similar physical and climatic characteristics are expected to have similar hydrologic characteristics. We map climate vulnerability by integrating the HL approach into a retrospective analysis of historical data to assess variability in future climate projections and hydrology, which includes temperature, precipitation, potential evapotranspiration, snow accumulation, climatic moisture, surplus water, and seasonality of water surplus. This paper illustrates how the HL approach can help assess climatic and hydrologic vulnerability across large spatial scales. By combining the HL concept and climate vulnerability analyses, we provide a planning approach that could allow resource managers to consider how future climate conditions may impact important economic and conservation resources. The data in this data set provides the Feddema Moisture Index, classified climate class, and classified season class for each time decade and 30 yr normal period from 1900-2010 and the 10 analyzed climate model projections described in the manuscript.

  12. Global web application critical vulnerability taxonomy 2023

    • statista.com
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista, Global web application critical vulnerability taxonomy 2023 [Dataset]. https://www.statista.com/statistics/806081/worldwide-application-vulnerability-taxonomy/
    Explore at:
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    2023
    Area covered
    Worldwide
    Description

    SQL Injection is the main source of web application critical vulnerabilities found globally in 2023, with ** percent, in addition to ** percent of internet facing critical vulnerabilities due to cross site scripting (stored) attacks.

  13. Network Vulnerability(Sample)

    • kaggle.com
    zip
    Updated Oct 30, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    SkywardAI Labs (2024). Network Vulnerability(Sample) [Dataset]. https://www.kaggle.com/datasets/skywardai/network-vulnerability
    Explore at:
    zip(90893 bytes)Available download formats
    Dataset updated
    Oct 30, 2024
    Dataset authored and provided by
    SkywardAI Labs
    License

    MIT Licensehttps://opensource.org/licenses/MIT
    License information was derived automatically

    Description

    Dataset

    This dataset was created by Bowen

    Released under MIT

    Contents

  14. Z

    Data Set from the Systematization of Vulnerability Discovery Metrics

    • data-staging.niaid.nih.gov
    • data.niaid.nih.gov
    Updated Mar 9, 2020
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Munaiah, Nuthan; Meneely, Andrew (2020). Data Set from the Systematization of Vulnerability Discovery Metrics [Dataset]. https://data-staging.niaid.nih.gov/resources?id=zenodo_3700823
    Explore at:
    Dataset updated
    Mar 9, 2020
    Dataset provided by
    Rochester Institute of Technology
    Authors
    Munaiah, Nuthan; Meneely, Andrew
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    The data set contains vulnerability discovery metric data extracted from 26 primary studies identified as part of the systematic literature review conducted. The review was conducted as part achieving our overall research vision to assist software engineers in building secure software by providing a technique that generates scientific, interpretable, and actionable feedback on security as the software evolves.

  15. Data from: National Vulnerability Database

    • datacatalog.library.wayne.edu
    Updated Jul 14, 2020
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    National Institute of Standards and Technology (2020). National Vulnerability Database [Dataset]. https://datacatalog.library.wayne.edu/dataset/national-vulnerability-database
    Explore at:
    Dataset updated
    Jul 14, 2020
    Dataset provided by
    National Institute of Standards and Technologyhttp://www.nist.gov/
    Description

    The National Vulnerability Database (NVD) is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. The NVD includes databases of security checklist references, security related software flaws, misconfigurations, product names, and impact metrics.

    Originally created in 2000 (called Internet - Categorization of Attacks Toolkit or ICAT), the NVD has undergone multiple iterations and improvements and will continue to do so to deliver its services. The NVD is a product of the NIST Computer Security Division, Information Technology Laboratory and is sponsored by the Department of Homeland Security’s National Cyber Security Division.

    The NVD performs analysis on CVEs that have been published to the CVE Dictionary. NVD staff are tasked with analysis of CVEs by aggregating data points from the description, references supplied and any supplemental data that can be found publicly at the time. This analysis results in association impact metrics (Common Vulnerability Scoring System - CVSS), vulnerability types (Common Weakness Enumeration - CWE), and applicability statements (Common Platform Enumeration - CPE), as well as other pertinent metadata. The NVD does not actively perform vulnerability testing, relying on vendors, third party security researchers and vulnerability coordinators to provide information that is then used to assign these attributes.

  16. i07 Water Shortage Vulnerability Sections

    • data.ca.gov
    • data.cnra.ca.gov
    • +5more
    Updated May 29, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    California Department of Water Resources (2025). i07 Water Shortage Vulnerability Sections [Dataset]. https://data.ca.gov/dataset/i07-water-shortage-vulnerability-sections
    Explore at:
    geojson, kml, arcgis geoservices rest api, csv, html, zipAvailable download formats
    Dataset updated
    May 29, 2025
    Dataset authored and provided by
    California Department of Water Resourceshttp://www.water.ca.gov/
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    This dataset represents a water shortage vulnerability analysis performed by DWR using modified PLSS sections pulled from the Well Completion Report PLSS Section Summaries. The attribute table includes water shortage vulnerability indicators and scores from an analysis done by CA Department of Water Resources, joined to modified PLSS sections. Several relevant summary statistics from the Well Completion Reports are included in this table as well. This data is from the 2024 analysis.

    Water Code Division 6 Part 2.55 Section 8 Chapter 10 (Assembly Bill 1668) effectively requires California Department of Water Resources (DWR), in consultation with other agencies and an advisory group, to identify small water suppliers and “rural communities” that are at risk of drought and water shortage. Following legislation passed in 2021 and signed by Governor Gavin Newsom, the Water Code Division 6, Section 10609.50 through 10609.80 (Senate Bill 552 of 2021) effectively requires the California Department of Water Resources to update the scoring and tool periodically in partnership with the State Water Board and other state agencies. This document describes the indicators, datasets, and methods used to construct this deliverable.  This is a statewide effort to systematically and holistically consider water shortage vulnerability statewide of rural communities, focusing on domestic wells and state small water systems serving between 4 and 14 connections. The indicators and scoring methodology will be revised as better data become available and stake-holders evaluate the performance of the indicators, datasets used, and aggregation and ranking method used to aggregate and rank vulnerability scores. Additionally, the scoring system should be adaptive, meaning that our understanding of what contributes to risk and vulnerability of drought and water shortage may evolve. This understanding may especially be informed by experiences gained while navigating responses to future droughts.”

    A spatial analysis was performed on the 2020 Census Block Groups, modified PLSS sections, and small water system service areas using a variety of input datasets related to drought vulnerability and water shortage risk and vulnerability. These indicator values were subsequently rescaled and summed for a final vulnerability score for the sections and small water system service areas. The 2020 Census Block Groups were joined with ACS data to represent the social vulnerability of communities, which is relevant to drought risk tolerance and resources. These three feature datasets contain the units of analysis (modified PLSS sections, block groups, small water systems service areas) with the model indicators for vulnerability in the attribute table. Model indicators are calculated for each unit of analysis according to the Vulnerability Scoring documents provided by Julia Ekstrom (Division of Regional Assistance).

    All three feature classes are DWR analysis zones that are based off existing GIS datasets. The spatial data for the sections feature class is extracted from the Well Completion Reports PLSS sections to be aligned with the work and analysis that SGMA is doing. These are not true PLSS sections, but a version of the projected section lines in areas where there are gaps in PLSS. The spatial data for the Census block group feature class is downloaded from the Census. ACS (American Communities Survey) data is joined by block group, and statistics calculated by DWR have been added to the attribute table. The spatial data for the small water systems feature class was extracted from the State Water Resources Control Board (SWRCB) SABL dataset, using a definition query to filter for active water systems with 3000 connections or less. None of these datasets are intended to be the authoritative datasets for representing PLSS sections, Census block groups, or water service areas. The spatial data of these feature classes is used as units of analysis for the spatial analysis performed by DWR.

    These datasets are intended to be authoritative datasets of the scoring tools required from DWR according to Senate Bill 552. Please refer to the Drought and Water Shortage Vulnerability Scoring: California's Domestic Wells and State Smalls Systems documentation for more information on indicators and scoring. These estimated indicator scores may sometimes be calculated in several different ways, or may have been calculated from data that has since be updated. Counts of domestic wells may be calculated in different ways. In order to align with DWR SGMO's (State Groundwater Management Office) California Groundwater Live dashboards, domestic wells were calculated using the same query. This includes all domestic wells in the Well Completion Reports dataset that are completed after 12/31/1976, and have a 'RecordType' of 'WellCompletion/New/Production or Monitoring/NA'.

    Please refer to the Well Completion Reports metadata for more information. The associated data are considered DWR enterprise GIS data, which meet all appropriate requirements of the DWR Spatial Data Standards, specifically the DWR Spatial Data Standard version 3.4, dated September 14, 2022. DWR makes no warranties or guarantees — either expressed or implied— as to the completeness, accuracy, or correctness of the data.

    DWR neither accepts nor assumes liability arising from or for any incorrect, incomplete, or misleading subject data. Comments, problems, improvements, updates, or suggestions should be forwarded to GIS@water.ca.gov.

  17. S

    Global Vulnerability Management Services Market Key Players and Market Share...

    • statsndata.org
    excel, pdf
    Updated Oct 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Stats N Data (2025). Global Vulnerability Management Services Market Key Players and Market Share 2025-2032 [Dataset]. https://www.statsndata.org/report/vulnerability-management-services-market-279220
    Explore at:
    pdf, excelAvailable download formats
    Dataset updated
    Oct 2025
    Dataset authored and provided by
    Stats N Data
    License

    https://www.statsndata.org/how-to-orderhttps://www.statsndata.org/how-to-order

    Area covered
    Global
    Description

    The Vulnerability Management Services market is an integral part of the cybersecurity landscape, addressing the pressing need for organizations to identify, assess, and remediate security vulnerabilities in their systems and applications. As cyber threats become more sophisticated, the demand for effective vulnerabi

  18. Data from: National Vulnerability Database

    • catalog.data.gov
    • data.nist.gov
    Updated Sep 30, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    National Institute of Standards and Technology (2025). National Vulnerability Database [Dataset]. https://catalog.data.gov/dataset/national-vulnerability-database
    Explore at:
    Dataset updated
    Sep 30, 2025
    Dataset provided by
    National Institute of Standards and Technologyhttp://www.nist.gov/
    Description

    Security automation reference data is currently housed within the National Vulnerability Database (NVD). The NVD is the U.S. Government repository of security automation data based on security automation specifications. This data provides a standards-based foundation for the automation of software asset, vulnerability, and security configuration management; security measurement; and compliance activities. This data supports security automation efforts based on the Security Content Automation Protocols (SCAP). The NVD includes databases of security configuration checklists for the NCP, listings of publicly known software flaws, product names, and impact metrics. A formal validation program tests the ability of vendor products to use some forms of security automation data based on a product's conformance in support of specific enterprise capabilities.

  19. A

    Climate Ready Boston Social Vulnerability

    • data.boston.gov
    • cloudcity.ogopendata.com
    • +3more
    Updated Sep 21, 2017
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Boston Maps (2017). Climate Ready Boston Social Vulnerability [Dataset]. https://data.boston.gov/dataset/climate-ready-boston-social-vulnerability
    Explore at:
    zip, html, geojson, arcgis geoservices rest api, csv, kmlAvailable download formats
    Dataset updated
    Sep 21, 2017
    Dataset provided by
    BostonMaps
    Authors
    Boston Maps
    License

    ODC Public Domain Dedication and Licence (PDDL) v1.0http://www.opendatacommons.org/licenses/pddl/1.0/
    License information was derived automatically

    Area covered
    Boston
    Description
    Social vulnerability is defined as the disproportionate susceptibility of some social groups to the impacts of hazards, including death, injury, loss, or disruption of livelihood. In this dataset from Climate Ready Boston, groups identified as being more vulnerable are older adults, children, people of color, people with limited English proficiency, people with low or no incomes, people with disabilities, and people with medical illnesses.

    Source:

    The analysis and definitions used in Climate Ready Boston (2016) are based on "A framework to understand the relationship between social factors that reduce resilience in cities: Application to the City of Boston." Published 2015 in the International Journal of Disaster Risk Reduction by Atyia Martin, Northeastern University.

    Population Definitions:

    Older Adults:
    Older adults (those over age 65) have physical vulnerabilities in a climate event; they suffer from higher rates of medical illness than the rest of the population and can have some functional limitations in an evacuation scenario, as well as when preparing for and recovering from a disaster. Furthermore, older adults are physically more vulnerable to the impacts of extreme heat. Beyond the physical risk, older adults are more likely to be socially isolated. Without an appropriate support network, an initially small risk could be exacerbated if an older adult is not able to get help.
    Data source: 2008-2012 American Community Survey 5-year Estimates (ACS) data by census tract for population over 65 years of age.
    Attribute label: OlderAdult

    Children:
    Families with children require additional resources in a climate event. When school is cancelled, parents need alternative childcare options, which can mean missing work. Children are especially vulnerable to extreme heat and stress following a natural disaster.
    Data source: 2010 American Community Survey 5-year Estimates (ACS) data by census tract for population under 5 years of age.
    Attribute label: TotChild

    People of Color:
    People of color make up a majority (53 percent) of Boston’s population. People of color are more likely to fall into multiple vulnerable groups as
    well. People of color statistically have lower levels of income and higher levels of poverty than the population at large. People of color, many of whom also have limited English proficiency, may not have ready access in their primary language to information about the dangers of extreme heat or about cooling center resources. This risk to extreme heat can be compounded by the fact that people of color often live in more densely populated urban areas that are at higher risk for heat exposure due to the urban heat island effect.
    Data source: 2008-2012 American Community Survey 5-year Estimates (ACS) data by census tract: Black, Native American, Asian, Island, Other, Multi, Non-white Hispanics.
    Attribute label: POC2

    Limited English Proficiency:
    Without adequate English skills, residents can miss crucial information on how to prepare
    for hazards. Cultural practices for information sharing, for example, may focus on word-of-mouth communication. In a flood event, residents can also face challenges communicating with emergency response personnel. If residents are more socially
    isolated, they may be less likely to hear about upcoming events. Finally, immigrants, especially ones who are undocumented, may be reluctant to use government services out of fear of deportation or general distrust of the government or emergency personnel.
    Data Source: 2008-2012 American Community Survey 5-year Estimates (ACS) data by census tract, defined as speaks English only or speaks English “very well”.
    Attribute label: LEP

    Low to no Income:
    A lack of financial resources impacts a household’s ability to prepare for a disaster event and to support friends and neighborhoods. For example, residents without televisions, computers, or data-driven mobile phones may face challenges getting news about hazards or recovery resources. Renters may have trouble finding and paying deposits for replacement housing if their residence is impacted by flooding. Homeowners may be less able to afford insurance that will cover flood damage. Having low or no income can create difficulty evacuating in a disaster event because of a higher reliance on public transportation. If unable to evacuate, residents may be more at risk without supplies to stay in their homes for an extended period of time. Low- and no-income residents can also be more vulnerable to hot weather if running air conditioning or fans puts utility costs out of reach.
    Data source: 2008-2012 American Community Survey 5-year Estimates (ACS) data by census tract for low-to- no income populations. The data represents a calculated field that combines people who were 100% below the poverty level and those who were 100–149% of the poverty level.
    Attribute label: Low_to_No

    People with Disabilities:
    People with disabilities are among the most vulnerable in an emergency; they sustain disproportionate rates of illness, injury, and death in disaster events.46 People with disabilities can find it difficult to adequately prepare for a disaster event, including moving to a safer place. They are more likely to be left behind or abandoned during evacuations. Rescue and relief resources—like emergency transportation or shelters, for example— may not be universally accessible. Research has revealed a historic pattern of discrimination against people with disabilities in times of resource scarcity, like after a major storm and flood.
    Data source: 2008-2012 American Community Survey 5-year Estimates (ACS) data by census tract for total civilian non-institutionalized population, including: hearing difficulty, vision difficulty, cognitive difficulty, ambulatory difficulty, self-care difficulty, and independent living difficulty.
    Attribute label: TotDis

    Medical Illness:
    Symptoms of existing medical illnesses are often exacerbated by hot temperatures. For example, heat can trigger asthma attacks or increase already high blood pressure due to the stress of high temperatures put on the body. Climate events can interrupt access to normal sources of healthcare and even life-sustaining medication. Special planning is required for people experiencing medical illness. For example, people dependent on dialysis will have different evacuation and care needs than other Boston residents in a climate event.
    Data source: Medical illness is a proxy measure which is based on EASI data accessed through Simply Map. Health data at the local level in Massachusetts is not available beyond zip codes. EASI modeled the health statistics for the U.S. population based upon age, sex, and race probabilities using U.S. Census Bureau data. The probabilities are modeled against the census and current year and five year forecasts. Medical illness is the sum of asthma in children, asthma in adults, heart disease, emphysema, bronchitis, cancer, diabetes, kidney disease, and liver disease. A limitation is that these numbers may be over-counted as the result of people potentially having more than one medical illness. Therefore, the analysis may have greater numbers of people with medical illness within census tracts than actually present. Overall, the analysis was based on the relationship between social factors.
    Attribute label: MedIllnes

    Other attribute definitions:
    GEOID10: Geographic identifier: State Code (25), Country Code (025), 2010 Census Tract
    AREA_SQFT: Tract area (in square feet)
    AREA_ACRES: Tract area (in acres)
    POP100_RE: Tract population count
    HU100_RE: Tract housing unit count
    Name: Boston Neighborhood
  20. CISA Known Vulnerabilities and Exploits Catalogue

    • kaggle.com
    zip
    Updated Oct 18, 2022
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    The Devastator (2022). CISA Known Vulnerabilities and Exploits Catalogue [Dataset]. https://www.kaggle.com/datasets/thedevastator/cisa-known-vulnerabilities-and-exploits-catalogu
    Explore at:
    zip(224363 bytes)Available download formats
    Dataset updated
    Oct 18, 2022
    Authors
    The Devastator
    Description

    CISA Known Vulnerabilities and Exploits Catalogue

    CVE-IDs with NVD Data, EPSS Scores, and In-The-Wild Tracker

    How to use the dataset

    The columns in the dataset are as follows:

    vendor_project: The vendor and project name. (String) product: The product name. (String) vulnerability_name: The name of the vulnerability. (String) date_added: The date the vulnerability was added to the dataset. (Date) short_description: A short description of the vulnerability. (String) required_action: The required action for the vulnerability. (String) due_date: The due date for the required action. (Date) notes: Notes about the vulnerability. (String) grp: pub_date cvss, cwe vector complexity severity

    Research Ideas

    • Find potential security vulnerabilities in a product or system
    • Track the progress of actions taken to mitigate CVEs
    • Alert users when new CVEs are discovered that affect their systems

    Columns

    File: 2022-06-08-enriched.csv | Column name | Description | |:-----------------------|:------------------------------------------------------------| | vendor_project | The vendor and project name. (String) | | product | The product name. (String) | | vulnerability_name | The name of the vulnerability. (String) | | date_added | The date the vulnerability was added to the dataset. (Date) | | short_description | A short description of the vulnerability. (String) | | required_action | The required action for the vulnerability. (String) | | due_date | The due date for the required action. (Date) | | notes | Notes about the vulnerability. (String) | | grp | The group the vulnerability is in. (String) | | pub_date | The date the vulnerability was published. (Date) | | cvss | The CVSS score for the vulnerability. (Float) | | cwe | The CWE for the vulnerability. (String) | | vector | The vector for the vulnerability. (String) | | complexity | The complexity for the vulnerability. (String) | | severity | The severity for the vulnerability. (String) |

    File: 2022-06-09-enriched.csv | Column name | Description | |:-----------------------|:------------------------------------------------------------| | vendor_project | The vendor and project name. (String) | | product | The product name. (String) | | vulnerability_name | The name of the vulnerability. (String) | | date_added | The date the vulnerability was added to the dataset. (Date) | | short_description | A short description of the vulnerability. (String) | | required_action | The required action for the vulnerability. (String) | | due_date | The due date for the required action. (Date) | | notes | Notes about the vulnerability. (String) | | grp | The group the vulnerability is in. (String) | | pub_date | The date the vulnerability was published. (Date) | | cvss | The CVSS score for the vulnerability. (Float) | | cwe | The CWE for the vulnerability. (String) | | vector | The vector for the vulnerability. (String) | | complexity | The complexity for the vulnerability. (String) | | severity | The severity for the vulnerability. (String) |

    File: 2022-06-27-enriched.csv | Column name | Description | |:-----------------------|:------------------------------------------------------------| | vendor_project | The vendor and project name. (String) | | product | The product name. (String) | | vulnerability_name | The name of the vulnerability. (String) | | date_added | The date the vulnerability was added to the dataset. (Date) | | short_description | A short description of the vulnerability. (String) | | required_action | The required action for the vulnerability. (String) | | due_date | The due date for the required action. (Date) ...

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
Statista (2025). Common IT vulnerabilities and exposures worldwide 2009-2025 [Dataset]. https://www.statista.com/statistics/500755/worldwide-common-vulnerabilities-and-exposures/
Organization logo

Common IT vulnerabilities and exposures worldwide 2009-2025

Explore at:
17 scholarly articles cite this dataset (View in Google Scholar)
Dataset updated
Nov 28, 2025
Dataset authored and provided by
Statistahttp://statista.com/
Area covered
Worldwide
Description

As of August 2024, internet users worldwide discovered around ****** new common IT security vulnerabilities and exposures (CVEs). The highest reported annual figure was recorded in 2023, over ******. Global ransomware threats In the past couple of years, ransomware has become more prominent, becoming the most frequently reported type of cyberattack worldwide in 2023. Additionally, ** percent of organizations worldwide reported experiencing one to three ransomware infections. Among researched markets, France and South Africa were impacted the most. Costly and efficient ransomware families, such as StopCrypt and LockBit, ranked first by detections globally. Additionally, the 2017 WannaCry attack still holds the record as the most impactful ransomware event, causing an estimated **** billion U.S. dollars in damages. Manufacturing and ransomware Manufacturing remains one of the most targeted industries for cyberattacks. In 2023, it was the most vulnerable sector globally to ransomware, experiencing approximately *** incidents worldwide. These attacks were especially prevalent in industrial organizations in North America. Additionally, malware and network or application anomalies were among the most common types of cyber incidents affecting manufacturing organizations.

Search
Clear search
Close search
Google apps
Main menu