Datasets:
cve stringlengths 13 16 | cwe stringclasses 520
values | affected_component stringlengths 0 177 | summary stringlengths 0 227 | severity stringclasses 5
values | cvss_v2 stringclasses 249
values | cvss_v3 stringlengths 37 48 ⌀ | description stringlengths 14 4k | statement stringlengths 1 2.49k ⌀ | discovery_date stringdate 2001-01-05 00:00:00 2026-03-20 21:01:27 | release_date stringdate 1999-01-01 00:00:00 2026-03-20 20:10:28 | fixed_products listlengths 0 28.2k | known_affected_products listlengths 0 1.55k | known_not_affected_products listlengths 0 30.5k | under_investigation_products listlengths 0 1.52k | threat_categories listlengths 0 4 | threat_details listlengths 0 4 | threat_dates listlengths 0 4 | remediation_categories listlengths 0 212 | remediation_details listlengths 0 212 | remediation_dates listlengths 0 212 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2026-28689 | CWE-367 | ImageMagick | ImageMagick: Information disclosure and unauthorized modification via symlink TOCTOU vulnerability | Moderate | null | 6.3/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N | A flaw was found in ImageMagick, a free and open-source software used for editing and manipulating digital images. A time-of-check to time-of-use (TOCTOU) vulnerability exists where authorization for a file path is checked before the file is finally opened or used. A local attacker can exploit this by performing a syml... | This MODERATE impact vulnerability in ImageMagick allows a Time-of-Check to Time-of-Use (TOCTOU) symlink race. An attacker could exploit this to bypass path policy restrictions, potentially leading to unauthorized read or write access to files. This affects Red Hat Enterprise Linux and Community Projects that include I... | 2026-03-09T22:02:02.292673+00:00 | 2026-03-09T21:39:13.731000+00:00 | [] | [
"red_hat_enterprise_linux_6:ImageMagick",
"red_hat_enterprise_linux_6:ImageMagick-c++",
"red_hat_enterprise_linux_6:ImageMagick-c++-devel",
"red_hat_enterprise_linux_6:ImageMagick-devel",
"red_hat_enterprise_linux_6:ImageMagick-doc",
"red_hat_enterprise_linux_6:ImageMagick-perl",
"red_hat_enterprise_lin... | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"workaround",
"no_fix_planned"
] | [
"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"Out of support scope"
] | [
null,
null
] |
CVE-2026-23180 | CWE-1285 | kernel | Linux kernel (dpaa2-switch): Out-of-bounds read in IRQ handler due to improper if_id validation | Moderate | null | 5.2/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L | In the Linux kernel, the following vulnerability has been resolved:
dpaa2-switch: add bounds check for if_id in IRQ handler
The IRQ handler extracts if_id from the upper 16 bits of the hardware
status register and uses it to index into ethsw->ports[] without
validation. Since if_id can be any 16-bit value (0-65535) b... | null | 2026-02-14T00:00:00+00:00 | 2026-02-14T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_10:kernel",
"red_hat_enterprise_linux_10:kernel-64k",
"red_hat_enterprise_linux_10:kernel-64k-core",
"red_hat_enterprise_linux_10:kernel-64k-debug",
"red_hat_enterprise_linux_10:kernel-64k-debug-core",
"red_hat_enterprise_linux_10:kernel-64k-debug-devel",
"red_hat_enterprise_li... | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_6:kernel-abi-whitelists",
"red_hat_enterprise_linux_6:kernel-bootwrapper",
"red_hat_enterprise_linux_6:kernel-debug",
"red_hat_enterprise_linux_6:kernel-debug-devel",
"red_hat_enterprise_linux_6:kernel-devel",
"red_hat_enterprise_linux_6:ker... | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"workaround",
"none_available"
] | [
"To mitigate this vulnerability, prevent the `dpaa2_switch` kernel module from loading. Create `/etc/modprobe.d/dpaa2_switch.conf` with the following content:\n`install dpaa2_switch /bin/true`\nAfter creating the file, regenerate the initramfs and reboot the system for the changes to take effect. Disabling this mod... | [
null,
null
] |
CVE-2026-22791 | CWE-131 | openCryptoki | openCryptoki: Denial of Service and heap corruption via heap buffer overflow | Moderate | null | 6.7/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H | A flaw was found in openCryptoki, a library for cryptographic operations. A local attacker can exploit a heap buffer overflow vulnerability within the CKM_ECDH_AES_KEY_WRAP implementation. By providing a compressed Elliptic Curve (EC) public key and invoking the C_WrapKey function, the attacker can trigger out-of-bound... | A local attacker can exploit a heap buffer overflow in openCryptoki's CKM_ECDH_AES_KEY_WRAP implementation, leading to heap corruption and denial of service. This vulnerability has been rated as Moderate by the Red Hat Product security team as, although it may lead to a out-of-bounds write, the impact is limited. When ... | 2026-01-13T20:02:09.302836+00:00 | 2026-01-13T19:06:41.052000+00:00 | [] | [
"red_hat_enterprise_linux_10:opencryptoki-ccatok",
"red_hat_enterprise_linux_10:opencryptoki-devel",
"red_hat_enterprise_linux_10:opencryptoki-ep11tok",
"red_hat_enterprise_linux_10:opencryptoki-icatok",
"red_hat_enterprise_linux_10:opencryptoki-icsftok",
"red_hat_enterprise_linux_10:opencryptoki-libs",
... | [
"red_hat_enterprise_linux_6:opencryptoki-devel",
"red_hat_enterprise_linux_6:opencryptoki-libs",
"red_hat_enterprise_linux_6:opencryptoki.src",
"red_hat_enterprise_linux_7:opencryptoki-ccatok",
"red_hat_enterprise_linux_7:opencryptoki-devel",
"red_hat_enterprise_linux_7:opencryptoki-ep11tok",
"red_hat_e... | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"workaround",
"none_available"
] | [
"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"Fix deferred"
] | [
null,
null
] |
CVE-2026-23883 | CWE-416 | freerdp | FreeRDP: Arbitrary code execution and denial of service via malicious server | Important | null | 7.5/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H | A flaw was found in FreeRDP, a free implementation of the Remote Desktop Protocol. A malicious server can exploit a use-after-free vulnerability by enticing a client to connect to it. This can lead to a client-side crash, resulting in a Denial of Service (DoS), and potentially allow for arbitrary code execution due to ... | For this vulnerability to be exploited, a client must connect to a maliciously-configured server. Red Hat recommends that FreeRDP clients are only used to connect to trusted servers. | 2026-01-19T18:01:42.972422+00:00 | 2026-01-19T17:15:55.735000+00:00 | [
"AppStream-10.0.Z.E2S:freerdp-2:3.10.3-3.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:freerdp-2:3.10.3-3.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:freerdp-2:3.10.3-3.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:freerdp-2:3.10.3-3.el10_0.1.src",
"AppStream-10.0.Z.E2S:freerdp-2:3.10.3-3.el10_0.1.x86_64",
"AppStream-10... | [
"red_hat_enterprise_linux_6:freerdp",
"red_hat_enterprise_linux_6:freerdp-devel",
"red_hat_enterprise_linux_6:freerdp-libs",
"red_hat_enterprise_linux_6:freerdp-plugins",
"red_hat_enterprise_linux_6:freerdp.src"
] | [
"red_hat_enterprise_linux_7:freerdp",
"red_hat_enterprise_linux_7:freerdp-devel",
"red_hat_enterprise_linux_7:freerdp-libs",
"red_hat_enterprise_linux_7:freerdp-plugins",
"red_hat_enterprise_linux_7:freerdp.src",
"red_hat_enterprise_linux_7:libwinpr",
"red_hat_enterprise_linux_7:libwinpr-devel"
] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"no_fix_planned"
] | [
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For d... | [
"2026-02-18T14:36:31+00:00",
"2026-02-09T01:41:56+00:00",
"2026-02-05T11:53:40+00:00",
"2026-02-17T03:29:34+00:00",
"2026-02-17T15:59:52+00:00",
"2026-02-16T13:12:12+00:00",
"2026-02-23T01:59:00+00:00",
"2026-02-05T10:29:20+00:00",
null
] |
CVE-2026-0989 | CWE-674 | libxml2 | Unbounded RelaxNG Include Recursion Leading to Stack Overflow | Low | null | 3.6/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L | A flaw was identified in the RelaxNG parser of libxml2 related to how external schema inclusions are handled. The parser does not enforce a limit on inclusion depth when resolving nested <include> directives. Specially crafted or overly complex schemas can cause excessive recursion during parsing. This may lead to stac... | This vulnerability is rated Low for Red Hat products. The flaw in libxml2's RelaxNG include handling requires attacker-controlled schema input to trigger unbounded recursion, leading to a denial of service. Exploitation is limited to scenarios where applications process untrusted RelaxNG schema files. | 2026-01-15T12:36:12.129000+00:00 | 2026-01-15T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_10:libxml2",
"red_hat_enterprise_linux_10:libxml2-devel",
"red_hat_enterprise_linux_10:libxml2-static",
"red_hat_enterprise_linux_10:libxml2.src",
"red_hat_enterprise_linux_10:python3-libxml2",
"red_hat_enterprise_linux_6:libxml2",
"red_hat_enterprise_linux_6:libxml2-devel",
... | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"workaround",
"none_available"
] | [
"To mitigate this issue, restrict applications using libxml2 from processing untrusted RelaxNG schema files. Implement strict input validation and sanitization for all RelaxNG schema inputs to prevent the parsing of maliciously crafted, deeply nested include directives.",
"Fix deferred"
] | [
null,
null
] |
CVE-2026-2408 | null | Use-after-free in Cloud Workloads | null | null | null | Tanium addressed a use-after-free vulnerability in the Cloud Workloads Enforce client extension. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | 2026-02-12T13:49:48.721000+00:00 | 2026-02-19T23:09:40.352000+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] | |
CVE-2026-27205 | CWE-524 | flask | Flask: Information disclosure via improper caching of session data | Moderate | null | 4.2/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N | A flaw was found in Flask, a Web Server Gateway Interface (WSGI) web application framework. When a Flask application accesses the session object using certain methods, it may fail to set the `Vary: Cookie` header. This oversight can cause sensitive, user-specific information to be improperly cached by a caching proxy, ... | null | 2026-02-21T06:01:15.465831+00:00 | 2026-02-21T05:21:17.214000+00:00 | [] | [
"red_hat_openshift_ai_(rhoai):rhoai/odh-kf-notebook-controller-rhel8",
"red_hat_openshift_ai_(rhoai):rhoai/odh-notebook-controller-rhel8",
"red_hat_quay_3:quay/quay-rhel8",
"red_hat_quay_3:quay/quay-rhel9",
"red_hat_satellite_6:satellite/iop-advisor-engine-rhel9",
"red_hat_satellite_6:satellite/iop-host-i... | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"no_fix_planned",
"none_available"
] | [
"Out of support scope",
"Fix deferred"
] | [
null,
null
] |
CVE-2026-23246 | CWE-787 | kernel | Linux kernel: Denial of Service in mac80211 Wi-Fi due to out-of-bounds write | Moderate | null | 5.8/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H | A flaw was found in the Linux kernel's mac80211 Wi-Fi subsystem. This vulnerability occurs in the ieee80211_ml_reconfiguration function when processing a Multi-Link (ML) Reconfiguration element. An attacker can provide a crafted link_id value that is not properly bounds-checked, leading to an out-of-bounds write on the... | A stack out of bounds write in mac80211 can occur when parsing the ML Reconfiguration element because link_id can be 15 while link_removal_timeout only has 15 entries indexed 0 to 14. A nearby attacker can potentially trigger this by injecting crafted 80211 management frames that include ML Reconfiguration subelements ... | 2026-03-18T00:00:00+00:00 | 2026-03-18T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_10:kernel",
"red_hat_enterprise_linux_10:kernel-64k",
"red_hat_enterprise_linux_10:kernel-64k-core",
"red_hat_enterprise_linux_10:kernel-64k-debug",
"red_hat_enterprise_linux_10:kernel-64k-debug-core",
"red_hat_enterprise_linux_10:kernel-64k-debug-devel",
"red_hat_enterprise_li... | [
"red_hat_enterprise_linux_7:bpftool",
"red_hat_enterprise_linux_7:kernel",
"red_hat_enterprise_linux_7:kernel-abi-whitelists",
"red_hat_enterprise_linux_7:kernel-bootwrapper",
"red_hat_enterprise_linux_7:kernel-debug",
"red_hat_enterprise_linux_7:kernel-debug-devel",
"red_hat_enterprise_linux_7:kernel-d... | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"no_fix_planned",
"none_available"
] | [
"Out of support scope",
"Affected"
] | [
null,
null
] |
CVE-2026-0966 | CWE-124 | libssh | Buffer underflow in ssh_get_hexa() on invalid input | Moderate | null | 6.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L | No description is available for this CVE. | null | 2026-01-26T23:14:46.617000+00:00 | 2026-02-10T18:47:15.531000+00:00 | [] | [
"red_hat_enterprise_linux_10:libssh",
"red_hat_enterprise_linux_10:libssh-config",
"red_hat_enterprise_linux_10:libssh-devel",
"red_hat_enterprise_linux_10:libssh.src",
"red_hat_enterprise_linux_8:libssh",
"red_hat_enterprise_linux_8:libssh-config",
"red_hat_enterprise_linux_8:libssh-devel",
"red_hat_... | [
"red_hat_enterprise_linux_6:libssh2",
"red_hat_enterprise_linux_6:libssh2-devel",
"red_hat_enterprise_linux_6:libssh2-docs",
"red_hat_enterprise_linux_6:libssh2.src",
"red_hat_enterprise_linux_7:libssh2",
"red_hat_enterprise_linux_7:libssh2-devel",
"red_hat_enterprise_linux_7:libssh2-docs",
"red_hat_e... | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"workaround",
"none_available",
"none_available"
] | [
"To mitigate this issue, consider disabling GSSAPI authentication if it is not required, or reduce the `LogLevel` in the `sshd_config` file to a value lower than `SSH_LOG_PACKET` (e.g., `INFO`).\n\nTo disable GSSAPI authentication, add or modify the following line in `/etc/ssh/sshd_config`:\n`GSSAPIAuthentication n... | [
null,
null,
null
] |
CVE-2026-1224 | null | Tanium addressed an uncontrolled resource consumption vulnerability in Discover. | null | null | null | Tanium addressed an uncontrolled resource consumption vulnerability in Discover. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | 2026-01-20T06:50:46.661000+00:00 | 2026-01-24T01:37:37.554000+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] | |
CVE-2026-31806 | CWE-131 | freerdp | FreeRDP: Arbitrary code execution via crafted Remote Desktop Protocol (RDP) server messages | Important | null | 8.7/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | A flaw was found in FreeRDP, a free implementation of the Remote Desktop Protocol (RDP). The `gdi_surface_bits()` function, which processes `SURFACE_BITS_COMMAND` messages, does not properly validate image dimensions (`bmp.width` and `bmp.height`) provided by a malicious RDP server. This can lead to a heap buffer overf... | For this vulnerability to be exploited, a susceptible system must connect to a malicious server. For that reason, Red Hat recommends that you only use FreeRDP to connect to trusted servers. | 2026-03-13T18:02:52.800795+00:00 | 2026-03-13T17:40:19.920000+00:00 | [] | [
"red_hat_enterprise_linux_10:freerdp",
"red_hat_enterprise_linux_10:freerdp-devel",
"red_hat_enterprise_linux_10:freerdp-libs",
"red_hat_enterprise_linux_10:freerdp-server",
"red_hat_enterprise_linux_10:freerdp.src",
"red_hat_enterprise_linux_10:libwinpr",
"red_hat_enterprise_linux_10:libwinpr-devel",
... | [
"red_hat_enterprise_linux_6:freerdp",
"red_hat_enterprise_linux_6:freerdp-devel",
"red_hat_enterprise_linux_6:freerdp-libs",
"red_hat_enterprise_linux_6:freerdp-plugins",
"red_hat_enterprise_linux_6:freerdp.src"
] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"none_available"
] | [
"Affected"
] | [
null
] |
CVE-2026-23138 | CWE-835 | kernel | tracing: Add recursion protection in kernel stack trace recording | Moderate | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | A flaw was found in the Linux kernel's tracing subsystem. When tracing RCU events with the kernel stack trace trigger enabled, an infinite recursion can occur because the stack trace recording code calls back into RCU, which then triggers another stack trace. This leads to a stack overflow and kernel crash. | Triggering this vulnerability requires the ability to configure kernel tracing with specific event triggers, which typically requires root or CAP_SYS_ADMIN privileges. The fix adds recursion protection bits to prevent re-entry into the stack trace code from the same context. | 2026-02-14T00:00:00+00:00 | 2026-02-14T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_10:kernel",
"red_hat_enterprise_linux_10:kernel-64k",
"red_hat_enterprise_linux_10:kernel-64k-core",
"red_hat_enterprise_linux_10:kernel-64k-debug",
"red_hat_enterprise_linux_10:kernel-64k-debug-core",
"red_hat_enterprise_linux_10:kernel-64k-debug-devel",
"red_hat_enterprise_li... | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_6:kernel-abi-whitelists",
"red_hat_enterprise_linux_6:kernel-bootwrapper",
"red_hat_enterprise_linux_6:kernel-debug",
"red_hat_enterprise_linux_6:kernel-debug-devel",
"red_hat_enterprise_linux_6:kernel-devel",
"red_hat_enterprise_linux_6:ker... | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"none_available"
] | [
"Fix deferred"
] | [
null
] |
CVE-2026-23092 | null | kernel | iio: dac: ad3552r-hs: fix out-of-bound write in ad3552r_hs_write_data_source | None | null | null | In the Linux kernel, the following vulnerability has been resolved:
iio: dac: ad3552r-hs: fix out-of-bound write in ad3552r_hs_write_data_source
When simple_write_to_buffer() succeeds, it returns the number of bytes
actually copied to the buffer. The code incorrectly uses 'count'
as the index for null termination ins... | null | 2026-02-04T00:00:00+00:00 | 2026-02-04T00:00:00+00:00 | [] | [] | [
"red_hat_enterprise_linux_10:kernel",
"red_hat_enterprise_linux_10:kernel-64k",
"red_hat_enterprise_linux_10:kernel-64k-core",
"red_hat_enterprise_linux_10:kernel-64k-debug",
"red_hat_enterprise_linux_10:kernel-64k-debug-core",
"red_hat_enterprise_linux_10:kernel-64k-debug-devel",
"red_hat_enterprise_li... | [] | [] | [] | [] | [] | [] | [] |
CVE-2026-23991 | CWE-754 | github.com/theupdateframework/go-tuf/v2 | go-tuf client DoS via malformed server response | Moderate | null | 5.8/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H | go-tuf is a Go implementation of The Update Framework (TUF). Starting in version 2.0.0 and prior to version 2.3.1, if the TUF repository (or any of its mirrors) returns invalid TUF metadata JSON (valid JSON but not well formed TUF metadata), the client will panic during parsing, causing a denial of service. The panic h... | null | 2026-01-22T03:01:10.607197+00:00 | 2026-01-22T02:16:37.294000+00:00 | [] | [
"openshift_pipelines:openshift-pipelines/pipelines-chains-controller-rhel9",
"openshift_pipelines:openshift-pipelines/pipelines-cli-tkn-rhel9",
"openshift_pipelines:openshift-pipelines/pipelines-opc-rhel9",
"openshift_pipelines:openshift-pipelines/pipelines-operator-bundle",
"openshift_pipelines:openshift-p... | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"workaround",
"none_available"
] | [
"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"Fix deferred"
] | [
null,
null
] |
CVE-2026-2776 | null | firefox | thunderbird: Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software | Important | null | 7.5/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H | A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue:
Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software | Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory. | 2026-02-24T14:02:24.297740+00:00 | 2026-02-24T13:33:12.247000+00:00 | [
"7Server-ELS:firefox-0:140.8.0-2.el7_9.ppc64",
"7Server-ELS:firefox-0:140.8.0-2.el7_9.ppc64le",
"7Server-ELS:firefox-0:140.8.0-2.el7_9.s390x",
"7Server-ELS:firefox-0:140.8.0-2.el7_9.src",
"7Server-ELS:firefox-0:140.8.0-2.el7_9.x86_64",
"7Server-ELS:firefox-debuginfo-0:140.8.0-2.el7_9.ppc64",
"7Server-EL... | [
"red_hat_enterprise_linux_10:rhel10/firefox-flatpak",
"red_hat_enterprise_linux_10:rhel10/thunderbird-flatpak",
"red_hat_enterprise_linux_6:firefox",
"red_hat_enterprise_linux_6:firefox.src",
"red_hat_enterprise_linux_6:thunderbird",
"red_hat_enterprise_linux_7:thunderbird"
] | [] | [] | [
"impact"
] | [
"Important"
] | [
null
] | [
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix",
"vendor_fix"... | [
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"For d... | [
"2026-03-09T02:00:27+00:00",
"2026-03-09T13:21:00+00:00",
"2026-03-11T05:56:46+00:00",
"2026-02-25T15:25:01+00:00",
"2026-03-02T11:06:17+00:00",
"2026-02-25T11:38:15+00:00",
"2026-03-02T10:59:32+00:00",
"2026-03-02T05:45:10+00:00",
"2026-03-12T08:19:25+00:00",
"2026-03-02T05:44:56+00:00",
"2026-... |
CVE-2026-2799 | null | firefox | thunderbird: Use-after-free in the DOM: Core & HTML component | Important | null | 7.5/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H | Use-after-free in the DOM: Core & HTML component. This vulnerability affects Firefox < 148 and Thunderbird < 148. | Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory. | 2026-02-24T14:03:13.307813+00:00 | 2026-02-24T13:33:28.665000+00:00 | [] | [] | [
"red_hat_enterprise_linux_10:firefox",
"red_hat_enterprise_linux_10:firefox.src",
"red_hat_enterprise_linux_10:rhel10/firefox-flatpak",
"red_hat_enterprise_linux_10:rhel10/thunderbird-flatpak",
"red_hat_enterprise_linux_10:thunderbird",
"red_hat_enterprise_linux_6:firefox",
"red_hat_enterprise_linux_6:f... | [] | [
"impact"
] | [
"Important"
] | [
null
] | [] | [] | [] |
CVE-2026-3921 | null | chromium-browser | Use after free in TextEncoding | null | null | 8.7/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | An use after free flaw was found in the TextEncoding component of the Chromium browser.
Upstream bug(s):
https://code.google.com/p/chromium/issues/detail?id=484946544 | Red Hat Product Security rates the severity of this flaw as determined by the Google Chrome Security Advisory. | 2026-03-13T08:09:22.318012+00:00 | 2026-03-10T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
CVE-2026-24868 | null | firefox | Mitigation bypass in the Privacy: Anti-Tracking component | Moderate | null | 6.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N | Mitigation bypass in the Privacy: Anti-Tracking component. This vulnerability affects Firefox < 147.0.2. | Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory. | 2026-01-27T17:02:44.202398+00:00 | 2026-01-27T15:58:48.472000+00:00 | [] | [] | [
"red_hat_enterprise_linux_10:firefox",
"red_hat_enterprise_linux_10:firefox.src",
"red_hat_enterprise_linux_10:rhel10/firefox-flatpak",
"red_hat_enterprise_linux_6:firefox",
"red_hat_enterprise_linux_6:firefox.src",
"red_hat_enterprise_linux_7:firefox",
"red_hat_enterprise_linux_7:firefox.src",
"red_h... | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [] | [] | [] |
CVE-2026-24491 | CWE-825 | freerdp | FreeRDP has a heap-use-after-free in video_timer | Moderate | null | 5.3/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L | A use after free flaw has been discovered in FreeRDP. The video_timer can send client notifications after the control channel is closed, dereferencing a freed callback and triggering a use after free. A malicious server can trigger a client‑side heap use after free causing a crash (DoS). | Availability impact is limited to the FreeRDP instance on Red Hat Products. General system availability is not at risk. | 2026-02-09T20:01:21.676057+00:00 | 2026-02-09T18:13:44.302000+00:00 | [] | [
"red_hat_enterprise_linux_10:freerdp",
"red_hat_enterprise_linux_10:freerdp-devel",
"red_hat_enterprise_linux_10:freerdp-libs",
"red_hat_enterprise_linux_10:freerdp-server",
"red_hat_enterprise_linux_10:freerdp.src",
"red_hat_enterprise_linux_10:libwinpr",
"red_hat_enterprise_linux_10:libwinpr-devel",
... | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"workaround",
"no_fix_planned",
"none_available"
] | [
"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"Out of support scope",
"Affected"
] | [
null,
null,
null
] |
CVE-2026-1766 | CWE-805 | localsearch | tracker-miners: GNOME localsearch MP3 Extractor: Denial of Service and information disclosure via malformed MP3 files. | Moderate | null | 5.7/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H | A flaw was found in GNOME localsearch (previously known as tracker-miners) MP3 Extractor, specifically within the tracker-extract-mp3 component. This heap buffer overflow vulnerability occurs when processing specially crafted MP3 files containing malformed ID3v2.3 COMM (Comment) tags. An attacker could exploit this by ... | This vulnerability has MODERATE impact. A heap buffer overflow in GNOME localsearch's MP3 extractor (`tracker-extract-mp3`) can lead to a denial of service and potential information disclosure. The flaw is triggered when processing a specially crafted MP3 file containing malformed ID3v2.3 COMM tags. | 2026-02-02T14:51:08.941000+00:00 | 2026-02-02T11:11:00+00:00 | [] | [
"red_hat_enterprise_linux_10:tracker-miners.src",
"red_hat_enterprise_linux_8:tracker-miners",
"red_hat_enterprise_linux_8:tracker-miners.src",
"red_hat_enterprise_linux_9:tracker-miners",
"red_hat_enterprise_linux_9:tracker-miners.src"
] | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"workaround",
"none_available"
] | [
"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"Fix deferred"
] | [
null,
null
] |
CVE-2026-26013 | CWE-918 | langchain | SSRF via image_url token counting in ChatOpenAI.get_num_tokens_from_messages | Low | null | 3.6/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L | A flaw was found in LangChain. The ChatOpenAI.get_num_tokens_from_messages method fetches arbitrary image_url values without validation when computing token counts for vision-enabled models. This issue allows an attacker to cause Server-Side Request Forgery (SSRF) by providing malicious image URLs in user input. | To exploit this issue, an attacker needs to be able to provide a malicious image_url to a LangChain instance. However, the server responses are not returned to the attacker (blind SSRF), increasing the complexity of exploitation. Additionally, an attacker can cause the server to fetch large files, potentially resulting... | 2026-02-10T23:00:52.822578+00:00 | 2026-02-10T21:51:07.741000+00:00 | [] | [
"openshift_lightspeed:openshift-lightspeed/lightspeed-service-api-rhel9",
"red_hat_ansible_automation_platform_2:ansible-automation-platform-24/lightspeed-rhel8",
"red_hat_ansible_automation_platform_2:ansible-automation-platform-25/lightspeed-rhel8",
"red_hat_ansible_automation_platform_2:ansible-automation-... | [] | [] | [
"impact"
] | [
"Low"
] | [
null
] | [
"workaround",
"none_available"
] | [
"To mitigate this issue, manually validate that all image_url fields use the HTTP/HTTPS protocols, point to allowed public domains and do not resolve to internal IP addresses before passing messages to ChatOpenAI or any LangChain model.",
"Fix deferred"
] | [
null,
null
] |
CVE-2026-23211 | CWE-280 | kernel | mm, swap: restore swap_space attr aviod kernel panic | Moderate | null | 5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | A flaw was found in the Linux kernel's memory management swap subsystem. A previous commit marked the swap address space as read-only, but when arch_prepare_to_swap() fails under heavy memory pressure, the kernel attempts to set a writeback error on the read-only mapping. This triggers a kernel panic during memory recl... | This issue can occur on systems under heavy memory pressure when swap operations fail and the kernel attempts to record the error. The panic occurs in the memory reclaim path, making it potentially triggerable by any workload that causes significant memory pressure. The fix restores the swap address space to read-write... | 2026-02-18T00:00:00+00:00 | 2026-02-18T00:00:00+00:00 | [] | [
"red_hat_enterprise_linux_6:kernel",
"red_hat_enterprise_linux_6:kernel-abi-whitelists",
"red_hat_enterprise_linux_6:kernel-bootwrapper",
"red_hat_enterprise_linux_6:kernel-debug",
"red_hat_enterprise_linux_6:kernel-debug-devel",
"red_hat_enterprise_linux_6:kernel-devel",
"red_hat_enterprise_linux_6:ker... | [
"red_hat_enterprise_linux_10:kernel",
"red_hat_enterprise_linux_10:kernel-64k",
"red_hat_enterprise_linux_10:kernel-64k-core",
"red_hat_enterprise_linux_10:kernel-64k-debug",
"red_hat_enterprise_linux_10:kernel-64k-debug-core",
"red_hat_enterprise_linux_10:kernel-64k-debug-devel",
"red_hat_enterprise_li... | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"no_fix_planned"
] | [
"Out of support scope"
] | [
null
] |
CVE-2026-25795 | CWE-476 | ImageMagick | ImageMagick: Denial of Service due to NULL pointer dereference during temporary file creation failure | Moderate | null | 5.3/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L | A flaw was found in ImageMagick, a widely used image editing and manipulation software. This vulnerability arises from a NULL pointer dereference that occurs when the software attempts to create temporary files and fails. An attacker could exploit this issue to trigger an application crash, leading to a Denial of Servi... | This MODERATE impact flaw in ImageMagick can lead to a denial of service due to a NULL pointer dereference when processing a crafted SFW image file. The vulnerability occurs if temporary file creation fails during image processing. Red Hat Enterprise Linux 6 ELS and 7 ELS are affected by this flaw. | 2026-02-24T02:01:08.280394+00:00 | 2026-02-24T00:54:34.640000+00:00 | [] | [
"red_hat_enterprise_linux_6:ImageMagick",
"red_hat_enterprise_linux_6:ImageMagick-c++",
"red_hat_enterprise_linux_6:ImageMagick-c++-devel",
"red_hat_enterprise_linux_6:ImageMagick-devel",
"red_hat_enterprise_linux_6:ImageMagick-doc",
"red_hat_enterprise_linux_6:ImageMagick-perl",
"red_hat_enterprise_lin... | [] | [] | [
"impact"
] | [
"Moderate"
] | [
null
] | [
"workaround",
"no_fix_planned"
] | [
"To reduce the risk associated with this vulnerability, avoid processing untrusted SFW image files with ImageMagick. If ImageMagick is deployed in environments where it processes untrusted input, consider implementing sandboxing or resource limits for ImageMagick processes to contain potential crashes and limit imp... | [
null,
null
] |
Dataset Card for RedHat-security-VeX
This Dataset is extracted from publicly available Vulnerability Exploitability eXchange (VEX) files published by Red Hat.
Dataset Details
Red Hat security data is a central source of truth for Red Hat products regarding published, known vulnerabilities. This data is published in form of Vulnerability Exploitability eXchange (VEX) available at: https://security.access.redhat.com/data/csaf/v2/vex/
This Dataset is created by extracting relevant information from this data and converting into a format, which can be used by models for fine-tuning or any other methods of data augmentation like RAG.
Data is extracted and uploaded using the following script: https://github.com/sidhpurwala-huzaifa/RedHat-security-vex-parser
- Curated by: Huzaifa Sidhpurwala huzaifas@redhat.com
- License: Creative Commons Attribution 4.0 International License
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
References
- https://www.redhat.com/en/blog/future-red-hat-security-data
- https://www.redhat.com/en/blog/vulnerability-exploitability-exchange-vex-beta-files-now-available
Disclaimer
This is not an official Red Hat supported repository. Rather this Dataset is created as a personal effort by Huzaifa Sidhpurwala. Red Hat in no way is responsible for the correctness or the accuracy of this data
- Downloads last month
- 63