The dataset viewer is not available because its heuristics could not detect any supported data files. You can try uploading some data files, or configuring the data files location manually.
OWASP Top 10 (2021) - Complete Dataset EN
Complete OWASP Top 10 (2021) dataset on Hugging Face. Comprehensive reference for web application security.
Description
This dataset covers all OWASP Top 10 2021 vulnerabilities:
- 10 vulnerabilities documented with detailed descriptions, examples, detection and mitigation
- 50 CWE mappings linking CWEs to OWASP categories
- 30 attack scenarios with concrete steps, code examples and impact analysis
- 60+ Q&A pairs covering all aspects of web security
Structure
1. vulnerabilities.json (10 entries)
id, name, description, category, cwe_ids, severity, examples, detection, mitigation, references_url, source_url
Categories: access_control, cryptography, injection, design, configuration, dependencies, authentication, integrity, monitoring, ssrf
2. cwe_mapping.json (50 entries)
id, cwe_id, name, description, owasp_category, examples, source_url
3. attack_scenarios.json (30 entries)
id, name, description, owasp_category, steps, impact, code_example, mitigation, source_url
4. qa_dataset.json (60+ entries)
id, question, answer, category, reference, difficulty, keywords, source_url
Vulnerabilities Covered
| # | Vulnerability | Severity |
|---|---|---|
| OWASP-01 | Broken Access Control | Critical |
| OWASP-02 | Cryptographic Failures | Critical |
| OWASP-03 | Injection (SQL, XSS, Command) | Critical |
| OWASP-04 | Insecure Design | High |
| OWASP-05 | Security Misconfiguration | High |
| OWASP-06 | Vulnerable and Outdated Components | High |
| OWASP-07 | Identification and Authentication Failures | Critical |
| OWASP-08 | Software and Data Integrity Failures | High |
| OWASP-09 | Security Logging and Monitoring Failures | Medium |
| OWASP-10 | Server-Side Request Forgery (SSRF) | High |
Usage
from datasets import load_dataset
# Load vulnerabilities
ds = load_dataset("AYI-NEDJIMI/owasp-top10-en", data_files="data/vulnerabilities.json")
for vuln in ds["train"]:
print(f"{vuln['id']} - {vuln['name']} ({vuln['severity']})")
# Load attack scenarios
ds = load_dataset("AYI-NEDJIMI/owasp-top10-en", data_files="data/attack_scenarios.json")
for scenario in ds["train"]:
print(f"{scenario['name']} - {scenario['owasp_category']}")
Use Cases
- DevSecOps: Reference for code reviews and security audits
- AppSec: Training material for developers
- Pentest: Attack scenarios for web penetration testing
- Training: Q&A for security certifications (CEH, OSCP, etc.)
- RAG / Fine-tuning: Training AI models specialized in web security
Other Datasets
| Dataset | Description | Link |
|---|---|---|
| OWASP Top 10 FR | OWASP Top 10 in French | owasp-top10-fr |
| ISO 27001:2022 FR | ISO 27001 in French | iso27001 |
| ISO 27001:2022 EN | ISO 27001 in English | iso27001-en |
| MITRE ATT&CK FR | ATT&CK in French | mitre-attack-fr |
| MITRE ATT&CK EN | ATT&CK in English | mitre-attack-en |
| AD Attacks FR | AD Attacks in French | ad-attacks-fr |
| AD Attacks EN | AD Attacks in English | ad-attacks-en |
Interactive Explorer
Explore this dataset interactively: OWASP Top 10 Explorer
Full Collection
This dataset is part of the Cybersecurity Datasets & Tools collection on HuggingFace.
Sources
- OWASP Top 10: owasp.org/Top10
- CWE: cwe.mitre.org
License
Citation
@dataset{owasp_top10_en_2025,
title={OWASP Top 10 (2021) - Complete Dataset EN},
author={AYI-NEDJIMI},
year={2025},
publisher={Hugging Face},
url={https://huggingface.co/datasets/AYI-NEDJIMI/owasp-top10-en}
}
Author & Resources
Ayi NEDJIMI - Senior Offensive Cybersecurity & AI Consultant
Cybersecurity Articles
- Website - Cybersecurity & AI Articles
- OAuth 2.0 Security Guide
- NTLM Relay Attacks Guide
- Kubernetes Security Hardening
- Memory Forensics with Volatility
- Securing Microsoft 365 with Conditional Access
AI Articles
- RAG: Retrieval-Augmented Generation
- Optimizing Document Chunking
- Choosing a Vector Database
- Embedding Security & Privacy
Social
Author
Ayi NEDJIMI - Cybersecurity Consultant & Trainer | AI Expert
Related Articles
Free Cybersecurity Resources
- Livre Blanc NIS 2
- Livre Blanc Sécurité Active Directory
- Livre Blanc Pentest Cloud AWS/Azure/GCP
- Livre Blanc Sécurité Kubernetes
- Livre Blanc IA Cyberdéfense
- Livre Blanc Anatomie Ransomware
- Guide Sécurisation AD 2025
- Guide Tiering Model AD
Part of the Collection
This dataset is part of the Cybersecurity Datasets & Tools Collection by AYI-NEDJIMI Consultants.
- Downloads last month
- 70