Dataset Viewer
Auto-converted to Parquet Duplicate
cve
stringlengths
13
16
cwe
stringclasses
520 values
affected_component
stringlengths
0
177
summary
stringlengths
0
227
severity
stringclasses
5 values
cvss_v2
stringclasses
249 values
cvss_v3
stringlengths
37
48
description
stringlengths
14
4k
statement
stringlengths
1
2.49k
discovery_date
stringdate
2001-01-05 00:00:00
2026-03-20 21:01:27
release_date
stringdate
1999-01-01 00:00:00
2026-03-20 20:10:28
fixed_products
listlengths
0
28.2k
known_affected_products
listlengths
0
1.55k
known_not_affected_products
listlengths
0
30.5k
under_investigation_products
listlengths
0
1.52k
threat_categories
listlengths
0
4
threat_details
listlengths
0
4
threat_dates
listlengths
0
4
remediation_categories
listlengths
0
212
remediation_details
listlengths
0
212
remediation_dates
listlengths
0
212
CVE-2026-28689
CWE-367
ImageMagick
ImageMagick: Information disclosure and unauthorized modification via symlink TOCTOU vulnerability
Moderate
null
6.3/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
A flaw was found in ImageMagick, a free and open-source software used for editing and manipulating digital images. A time-of-check to time-of-use (TOCTOU) vulnerability exists where authorization for a file path is checked before the file is finally opened or used. A local attacker can exploit this by performing a syml...
This MODERATE impact vulnerability in ImageMagick allows a Time-of-Check to Time-of-Use (TOCTOU) symlink race. An attacker could exploit this to bypass path policy restrictions, potentially leading to unauthorized read or write access to files. This affects Red Hat Enterprise Linux and Community Projects that include I...
2026-03-09T22:02:02.292673+00:00
2026-03-09T21:39:13.731000+00:00
[]
[ "red_hat_enterprise_linux_6:ImageMagick", "red_hat_enterprise_linux_6:ImageMagick-c++", "red_hat_enterprise_linux_6:ImageMagick-c++-devel", "red_hat_enterprise_linux_6:ImageMagick-devel", "red_hat_enterprise_linux_6:ImageMagick-doc", "red_hat_enterprise_linux_6:ImageMagick-perl", "red_hat_enterprise_lin...
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "workaround", "no_fix_planned" ]
[ "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "Out of support scope" ]
[ null, null ]
CVE-2026-23180
CWE-1285
kernel
Linux kernel (dpaa2-switch): Out-of-bounds read in IRQ handler due to improper if_id validation
Moderate
null
5.2/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
In the Linux kernel, the following vulnerability has been resolved: dpaa2-switch: add bounds check for if_id in IRQ handler The IRQ handler extracts if_id from the upper 16 bits of the hardware status register and uses it to index into ethsw->ports[] without validation. Since if_id can be any 16-bit value (0-65535) b...
null
2026-02-14T00:00:00+00:00
2026-02-14T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_10:kernel", "red_hat_enterprise_linux_10:kernel-64k", "red_hat_enterprise_linux_10:kernel-64k-core", "red_hat_enterprise_linux_10:kernel-64k-debug", "red_hat_enterprise_linux_10:kernel-64k-debug-core", "red_hat_enterprise_linux_10:kernel-64k-debug-devel", "red_hat_enterprise_li...
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_6:kernel-abi-whitelists", "red_hat_enterprise_linux_6:kernel-bootwrapper", "red_hat_enterprise_linux_6:kernel-debug", "red_hat_enterprise_linux_6:kernel-debug-devel", "red_hat_enterprise_linux_6:kernel-devel", "red_hat_enterprise_linux_6:ker...
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "workaround", "none_available" ]
[ "To mitigate this vulnerability, prevent the `dpaa2_switch` kernel module from loading. Create `/etc/modprobe.d/dpaa2_switch.conf` with the following content:\n`install dpaa2_switch /bin/true`\nAfter creating the file, regenerate the initramfs and reboot the system for the changes to take effect. Disabling this mod...
[ null, null ]
CVE-2026-22791
CWE-131
openCryptoki
openCryptoki: Denial of Service and heap corruption via heap buffer overflow
Moderate
null
6.7/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
A flaw was found in openCryptoki, a library for cryptographic operations. A local attacker can exploit a heap buffer overflow vulnerability within the CKM_ECDH_AES_KEY_WRAP implementation. By providing a compressed Elliptic Curve (EC) public key and invoking the C_WrapKey function, the attacker can trigger out-of-bound...
A local attacker can exploit a heap buffer overflow in openCryptoki's CKM_ECDH_AES_KEY_WRAP implementation, leading to heap corruption and denial of service. This vulnerability has been rated as Moderate by the Red Hat Product security team as, although it may lead to a out-of-bounds write, the impact is limited. When ...
2026-01-13T20:02:09.302836+00:00
2026-01-13T19:06:41.052000+00:00
[]
[ "red_hat_enterprise_linux_10:opencryptoki-ccatok", "red_hat_enterprise_linux_10:opencryptoki-devel", "red_hat_enterprise_linux_10:opencryptoki-ep11tok", "red_hat_enterprise_linux_10:opencryptoki-icatok", "red_hat_enterprise_linux_10:opencryptoki-icsftok", "red_hat_enterprise_linux_10:opencryptoki-libs", ...
[ "red_hat_enterprise_linux_6:opencryptoki-devel", "red_hat_enterprise_linux_6:opencryptoki-libs", "red_hat_enterprise_linux_6:opencryptoki.src", "red_hat_enterprise_linux_7:opencryptoki-ccatok", "red_hat_enterprise_linux_7:opencryptoki-devel", "red_hat_enterprise_linux_7:opencryptoki-ep11tok", "red_hat_e...
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "workaround", "none_available" ]
[ "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "Fix deferred" ]
[ null, null ]
CVE-2026-23883
CWE-416
freerdp
FreeRDP: Arbitrary code execution and denial of service via malicious server
Important
null
7.5/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
A flaw was found in FreeRDP, a free implementation of the Remote Desktop Protocol. A malicious server can exploit a use-after-free vulnerability by enticing a client to connect to it. This can lead to a client-side crash, resulting in a Denial of Service (DoS), and potentially allow for arbitrary code execution due to ...
For this vulnerability to be exploited, a client must connect to a maliciously-configured server. Red Hat recommends that FreeRDP clients are only used to connect to trusted servers.
2026-01-19T18:01:42.972422+00:00
2026-01-19T17:15:55.735000+00:00
[ "AppStream-10.0.Z.E2S:freerdp-2:3.10.3-3.el10_0.1.aarch64", "AppStream-10.0.Z.E2S:freerdp-2:3.10.3-3.el10_0.1.ppc64le", "AppStream-10.0.Z.E2S:freerdp-2:3.10.3-3.el10_0.1.s390x", "AppStream-10.0.Z.E2S:freerdp-2:3.10.3-3.el10_0.1.src", "AppStream-10.0.Z.E2S:freerdp-2:3.10.3-3.el10_0.1.x86_64", "AppStream-10...
[ "red_hat_enterprise_linux_6:freerdp", "red_hat_enterprise_linux_6:freerdp-devel", "red_hat_enterprise_linux_6:freerdp-libs", "red_hat_enterprise_linux_6:freerdp-plugins", "red_hat_enterprise_linux_6:freerdp.src" ]
[ "red_hat_enterprise_linux_7:freerdp", "red_hat_enterprise_linux_7:freerdp-devel", "red_hat_enterprise_linux_7:freerdp-libs", "red_hat_enterprise_linux_7:freerdp-plugins", "red_hat_enterprise_linux_7:freerdp.src", "red_hat_enterprise_linux_7:libwinpr", "red_hat_enterprise_linux_7:libwinpr-devel" ]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "no_fix_planned" ]
[ "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "For d...
[ "2026-02-18T14:36:31+00:00", "2026-02-09T01:41:56+00:00", "2026-02-05T11:53:40+00:00", "2026-02-17T03:29:34+00:00", "2026-02-17T15:59:52+00:00", "2026-02-16T13:12:12+00:00", "2026-02-23T01:59:00+00:00", "2026-02-05T10:29:20+00:00", null ]
CVE-2026-0989
CWE-674
libxml2
Unbounded RelaxNG Include Recursion Leading to Stack Overflow
Low
null
3.6/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
A flaw was identified in the RelaxNG parser of libxml2 related to how external schema inclusions are handled. The parser does not enforce a limit on inclusion depth when resolving nested <include> directives. Specially crafted or overly complex schemas can cause excessive recursion during parsing. This may lead to stac...
This vulnerability is rated Low for Red Hat products. The flaw in libxml2's RelaxNG include handling requires attacker-controlled schema input to trigger unbounded recursion, leading to a denial of service. Exploitation is limited to scenarios where applications process untrusted RelaxNG schema files.
2026-01-15T12:36:12.129000+00:00
2026-01-15T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_10:libxml2", "red_hat_enterprise_linux_10:libxml2-devel", "red_hat_enterprise_linux_10:libxml2-static", "red_hat_enterprise_linux_10:libxml2.src", "red_hat_enterprise_linux_10:python3-libxml2", "red_hat_enterprise_linux_6:libxml2", "red_hat_enterprise_linux_6:libxml2-devel", ...
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "workaround", "none_available" ]
[ "To mitigate this issue, restrict applications using libxml2 from processing untrusted RelaxNG schema files. Implement strict input validation and sanitization for all RelaxNG schema inputs to prevent the parsing of maliciously crafted, deeply nested include directives.", "Fix deferred" ]
[ null, null ]
CVE-2026-2408
null
Use-after-free in Cloud Workloads
null
null
null
Tanium addressed a use-after-free vulnerability in the Cloud Workloads Enforce client extension.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
2026-02-12T13:49:48.721000+00:00
2026-02-19T23:09:40.352000+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2026-27205
CWE-524
flask
Flask: Information disclosure via improper caching of session data
Moderate
null
4.2/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
A flaw was found in Flask, a Web Server Gateway Interface (WSGI) web application framework. When a Flask application accesses the session object using certain methods, it may fail to set the `Vary: Cookie` header. This oversight can cause sensitive, user-specific information to be improperly cached by a caching proxy, ...
null
2026-02-21T06:01:15.465831+00:00
2026-02-21T05:21:17.214000+00:00
[]
[ "red_hat_openshift_ai_(rhoai):rhoai/odh-kf-notebook-controller-rhel8", "red_hat_openshift_ai_(rhoai):rhoai/odh-notebook-controller-rhel8", "red_hat_quay_3:quay/quay-rhel8", "red_hat_quay_3:quay/quay-rhel9", "red_hat_satellite_6:satellite/iop-advisor-engine-rhel9", "red_hat_satellite_6:satellite/iop-host-i...
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "no_fix_planned", "none_available" ]
[ "Out of support scope", "Fix deferred" ]
[ null, null ]
CVE-2026-23246
CWE-787
kernel
Linux kernel: Denial of Service in mac80211 Wi-Fi due to out-of-bounds write
Moderate
null
5.8/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
A flaw was found in the Linux kernel's mac80211 Wi-Fi subsystem. This vulnerability occurs in the ieee80211_ml_reconfiguration function when processing a Multi-Link (ML) Reconfiguration element. An attacker can provide a crafted link_id value that is not properly bounds-checked, leading to an out-of-bounds write on the...
A stack out of bounds write in mac80211 can occur when parsing the ML Reconfiguration element because link_id can be 15 while link_removal_timeout only has 15 entries indexed 0 to 14. A nearby attacker can potentially trigger this by injecting crafted 80211 management frames that include ML Reconfiguration subelements ...
2026-03-18T00:00:00+00:00
2026-03-18T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_10:kernel", "red_hat_enterprise_linux_10:kernel-64k", "red_hat_enterprise_linux_10:kernel-64k-core", "red_hat_enterprise_linux_10:kernel-64k-debug", "red_hat_enterprise_linux_10:kernel-64k-debug-core", "red_hat_enterprise_linux_10:kernel-64k-debug-devel", "red_hat_enterprise_li...
[ "red_hat_enterprise_linux_7:bpftool", "red_hat_enterprise_linux_7:kernel", "red_hat_enterprise_linux_7:kernel-abi-whitelists", "red_hat_enterprise_linux_7:kernel-bootwrapper", "red_hat_enterprise_linux_7:kernel-debug", "red_hat_enterprise_linux_7:kernel-debug-devel", "red_hat_enterprise_linux_7:kernel-d...
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "no_fix_planned", "none_available" ]
[ "Out of support scope", "Affected" ]
[ null, null ]
CVE-2026-0966
CWE-124
libssh
Buffer underflow in ssh_get_hexa() on invalid input
Moderate
null
6.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
No description is available for this CVE.
null
2026-01-26T23:14:46.617000+00:00
2026-02-10T18:47:15.531000+00:00
[]
[ "red_hat_enterprise_linux_10:libssh", "red_hat_enterprise_linux_10:libssh-config", "red_hat_enterprise_linux_10:libssh-devel", "red_hat_enterprise_linux_10:libssh.src", "red_hat_enterprise_linux_8:libssh", "red_hat_enterprise_linux_8:libssh-config", "red_hat_enterprise_linux_8:libssh-devel", "red_hat_...
[ "red_hat_enterprise_linux_6:libssh2", "red_hat_enterprise_linux_6:libssh2-devel", "red_hat_enterprise_linux_6:libssh2-docs", "red_hat_enterprise_linux_6:libssh2.src", "red_hat_enterprise_linux_7:libssh2", "red_hat_enterprise_linux_7:libssh2-devel", "red_hat_enterprise_linux_7:libssh2-docs", "red_hat_e...
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "workaround", "none_available", "none_available" ]
[ "To mitigate this issue, consider disabling GSSAPI authentication if it is not required, or reduce the `LogLevel` in the `sshd_config` file to a value lower than `SSH_LOG_PACKET` (e.g., `INFO`).\n\nTo disable GSSAPI authentication, add or modify the following line in `/etc/ssh/sshd_config`:\n`GSSAPIAuthentication n...
[ null, null, null ]
CVE-2026-1224
null
Tanium addressed an uncontrolled resource consumption vulnerability in Discover.
null
null
null
Tanium addressed an uncontrolled resource consumption vulnerability in Discover.
Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.
2026-01-20T06:50:46.661000+00:00
2026-01-24T01:37:37.554000+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2026-31806
CWE-131
freerdp
FreeRDP: Arbitrary code execution via crafted Remote Desktop Protocol (RDP) server messages
Important
null
8.7/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
A flaw was found in FreeRDP, a free implementation of the Remote Desktop Protocol (RDP). The `gdi_surface_bits()` function, which processes `SURFACE_BITS_COMMAND` messages, does not properly validate image dimensions (`bmp.width` and `bmp.height`) provided by a malicious RDP server. This can lead to a heap buffer overf...
For this vulnerability to be exploited, a susceptible system must connect to a malicious server. For that reason, Red Hat recommends that you only use FreeRDP to connect to trusted servers.
2026-03-13T18:02:52.800795+00:00
2026-03-13T17:40:19.920000+00:00
[]
[ "red_hat_enterprise_linux_10:freerdp", "red_hat_enterprise_linux_10:freerdp-devel", "red_hat_enterprise_linux_10:freerdp-libs", "red_hat_enterprise_linux_10:freerdp-server", "red_hat_enterprise_linux_10:freerdp.src", "red_hat_enterprise_linux_10:libwinpr", "red_hat_enterprise_linux_10:libwinpr-devel", ...
[ "red_hat_enterprise_linux_6:freerdp", "red_hat_enterprise_linux_6:freerdp-devel", "red_hat_enterprise_linux_6:freerdp-libs", "red_hat_enterprise_linux_6:freerdp-plugins", "red_hat_enterprise_linux_6:freerdp.src" ]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "none_available" ]
[ "Affected" ]
[ null ]
CVE-2026-23138
CWE-835
kernel
tracing: Add recursion protection in kernel stack trace recording
Moderate
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
A flaw was found in the Linux kernel's tracing subsystem. When tracing RCU events with the kernel stack trace trigger enabled, an infinite recursion can occur because the stack trace recording code calls back into RCU, which then triggers another stack trace. This leads to a stack overflow and kernel crash.
Triggering this vulnerability requires the ability to configure kernel tracing with specific event triggers, which typically requires root or CAP_SYS_ADMIN privileges. The fix adds recursion protection bits to prevent re-entry into the stack trace code from the same context.
2026-02-14T00:00:00+00:00
2026-02-14T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_10:kernel", "red_hat_enterprise_linux_10:kernel-64k", "red_hat_enterprise_linux_10:kernel-64k-core", "red_hat_enterprise_linux_10:kernel-64k-debug", "red_hat_enterprise_linux_10:kernel-64k-debug-core", "red_hat_enterprise_linux_10:kernel-64k-debug-devel", "red_hat_enterprise_li...
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_6:kernel-abi-whitelists", "red_hat_enterprise_linux_6:kernel-bootwrapper", "red_hat_enterprise_linux_6:kernel-debug", "red_hat_enterprise_linux_6:kernel-debug-devel", "red_hat_enterprise_linux_6:kernel-devel", "red_hat_enterprise_linux_6:ker...
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "none_available" ]
[ "Fix deferred" ]
[ null ]
CVE-2026-23092
null
kernel
iio: dac: ad3552r-hs: fix out-of-bound write in ad3552r_hs_write_data_source
None
null
null
In the Linux kernel, the following vulnerability has been resolved: iio: dac: ad3552r-hs: fix out-of-bound write in ad3552r_hs_write_data_source When simple_write_to_buffer() succeeds, it returns the number of bytes actually copied to the buffer. The code incorrectly uses 'count' as the index for null termination ins...
null
2026-02-04T00:00:00+00:00
2026-02-04T00:00:00+00:00
[]
[]
[ "red_hat_enterprise_linux_10:kernel", "red_hat_enterprise_linux_10:kernel-64k", "red_hat_enterprise_linux_10:kernel-64k-core", "red_hat_enterprise_linux_10:kernel-64k-debug", "red_hat_enterprise_linux_10:kernel-64k-debug-core", "red_hat_enterprise_linux_10:kernel-64k-debug-devel", "red_hat_enterprise_li...
[]
[]
[]
[]
[]
[]
[]
CVE-2026-23991
CWE-754
github.com/theupdateframework/go-tuf/v2
go-tuf client DoS via malformed server response
Moderate
null
5.8/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
go-tuf is a Go implementation of The Update Framework (TUF). Starting in version 2.0.0 and prior to version 2.3.1, if the TUF repository (or any of its mirrors) returns invalid TUF metadata JSON (valid JSON but not well formed TUF metadata), the client will panic during parsing, causing a denial of service. The panic h...
null
2026-01-22T03:01:10.607197+00:00
2026-01-22T02:16:37.294000+00:00
[]
[ "openshift_pipelines:openshift-pipelines/pipelines-chains-controller-rhel9", "openshift_pipelines:openshift-pipelines/pipelines-cli-tkn-rhel9", "openshift_pipelines:openshift-pipelines/pipelines-opc-rhel9", "openshift_pipelines:openshift-pipelines/pipelines-operator-bundle", "openshift_pipelines:openshift-p...
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "workaround", "none_available" ]
[ "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "Fix deferred" ]
[ null, null ]
CVE-2026-2776
null
firefox
thunderbird: Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software
Important
null
7.5/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software
Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.
2026-02-24T14:02:24.297740+00:00
2026-02-24T13:33:12.247000+00:00
[ "7Server-ELS:firefox-0:140.8.0-2.el7_9.ppc64", "7Server-ELS:firefox-0:140.8.0-2.el7_9.ppc64le", "7Server-ELS:firefox-0:140.8.0-2.el7_9.s390x", "7Server-ELS:firefox-0:140.8.0-2.el7_9.src", "7Server-ELS:firefox-0:140.8.0-2.el7_9.x86_64", "7Server-ELS:firefox-debuginfo-0:140.8.0-2.el7_9.ppc64", "7Server-EL...
[ "red_hat_enterprise_linux_10:rhel10/firefox-flatpak", "red_hat_enterprise_linux_10:rhel10/thunderbird-flatpak", "red_hat_enterprise_linux_6:firefox", "red_hat_enterprise_linux_6:firefox.src", "red_hat_enterprise_linux_6:thunderbird", "red_hat_enterprise_linux_7:thunderbird" ]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix", "vendor_fix"...
[ "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "For d...
[ "2026-03-09T02:00:27+00:00", "2026-03-09T13:21:00+00:00", "2026-03-11T05:56:46+00:00", "2026-02-25T15:25:01+00:00", "2026-03-02T11:06:17+00:00", "2026-02-25T11:38:15+00:00", "2026-03-02T10:59:32+00:00", "2026-03-02T05:45:10+00:00", "2026-03-12T08:19:25+00:00", "2026-03-02T05:44:56+00:00", "2026-...
CVE-2026-2799
null
firefox
thunderbird: Use-after-free in the DOM: Core & HTML component
Important
null
7.5/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Use-after-free in the DOM: Core & HTML component. This vulnerability affects Firefox < 148 and Thunderbird < 148.
Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.
2026-02-24T14:03:13.307813+00:00
2026-02-24T13:33:28.665000+00:00
[]
[]
[ "red_hat_enterprise_linux_10:firefox", "red_hat_enterprise_linux_10:firefox.src", "red_hat_enterprise_linux_10:rhel10/firefox-flatpak", "red_hat_enterprise_linux_10:rhel10/thunderbird-flatpak", "red_hat_enterprise_linux_10:thunderbird", "red_hat_enterprise_linux_6:firefox", "red_hat_enterprise_linux_6:f...
[]
[ "impact" ]
[ "Important" ]
[ null ]
[]
[]
[]
CVE-2026-3921
null
chromium-browser
Use after free in TextEncoding
null
null
8.7/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
An use after free flaw was found in the TextEncoding component of the Chromium browser. Upstream bug(s): https://code.google.com/p/chromium/issues/detail?id=484946544
Red Hat Product Security rates the severity of this flaw as determined by the Google Chrome Security Advisory.
2026-03-13T08:09:22.318012+00:00
2026-03-10T00:00:00+00:00
[]
[]
[ "red_hat_products" ]
[]
[]
[]
[]
[]
[]
[]
CVE-2026-24868
null
firefox
Mitigation bypass in the Privacy: Anti-Tracking component
Moderate
null
6.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Mitigation bypass in the Privacy: Anti-Tracking component. This vulnerability affects Firefox < 147.0.2.
Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.
2026-01-27T17:02:44.202398+00:00
2026-01-27T15:58:48.472000+00:00
[]
[]
[ "red_hat_enterprise_linux_10:firefox", "red_hat_enterprise_linux_10:firefox.src", "red_hat_enterprise_linux_10:rhel10/firefox-flatpak", "red_hat_enterprise_linux_6:firefox", "red_hat_enterprise_linux_6:firefox.src", "red_hat_enterprise_linux_7:firefox", "red_hat_enterprise_linux_7:firefox.src", "red_h...
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[]
[]
[]
CVE-2026-24491
CWE-825
freerdp
FreeRDP has a heap-use-after-free in video_timer
Moderate
null
5.3/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
A use after free flaw has been discovered in FreeRDP. The video_timer can send client notifications after the control channel is closed, dereferencing a freed callback and triggering a use after free. A malicious server can trigger a client‑side heap use after free causing a crash (DoS).
Availability impact is limited to the FreeRDP instance on Red Hat Products. General system availability is not at risk.
2026-02-09T20:01:21.676057+00:00
2026-02-09T18:13:44.302000+00:00
[]
[ "red_hat_enterprise_linux_10:freerdp", "red_hat_enterprise_linux_10:freerdp-devel", "red_hat_enterprise_linux_10:freerdp-libs", "red_hat_enterprise_linux_10:freerdp-server", "red_hat_enterprise_linux_10:freerdp.src", "red_hat_enterprise_linux_10:libwinpr", "red_hat_enterprise_linux_10:libwinpr-devel", ...
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "workaround", "no_fix_planned", "none_available" ]
[ "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "Out of support scope", "Affected" ]
[ null, null, null ]
CVE-2026-1766
CWE-805
localsearch
tracker-miners: GNOME localsearch MP3 Extractor: Denial of Service and information disclosure via malformed MP3 files.
Moderate
null
5.7/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H
A flaw was found in GNOME localsearch (previously known as tracker-miners) MP3 Extractor, specifically within the tracker-extract-mp3 component. This heap buffer overflow vulnerability occurs when processing specially crafted MP3 files containing malformed ID3v2.3 COMM (Comment) tags. An attacker could exploit this by ...
This vulnerability has MODERATE impact. A heap buffer overflow in GNOME localsearch's MP3 extractor (`tracker-extract-mp3`) can lead to a denial of service and potential information disclosure. The flaw is triggered when processing a specially crafted MP3 file containing malformed ID3v2.3 COMM tags.
2026-02-02T14:51:08.941000+00:00
2026-02-02T11:11:00+00:00
[]
[ "red_hat_enterprise_linux_10:tracker-miners.src", "red_hat_enterprise_linux_8:tracker-miners", "red_hat_enterprise_linux_8:tracker-miners.src", "red_hat_enterprise_linux_9:tracker-miners", "red_hat_enterprise_linux_9:tracker-miners.src" ]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "workaround", "none_available" ]
[ "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "Fix deferred" ]
[ null, null ]
CVE-2026-26013
CWE-918
langchain
SSRF via image_url token counting in ChatOpenAI.get_num_tokens_from_messages
Low
null
3.6/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
A flaw was found in LangChain. The ChatOpenAI.get_num_tokens_from_messages method fetches arbitrary image_url values without validation when computing token counts for vision-enabled models. This issue allows an attacker to cause Server-Side Request Forgery (SSRF) by providing malicious image URLs in user input.
To exploit this issue, an attacker needs to be able to provide a malicious image_url to a LangChain instance. However, the server responses are not returned to the attacker (blind SSRF), increasing the complexity of exploitation. Additionally, an attacker can cause the server to fetch large files, potentially resulting...
2026-02-10T23:00:52.822578+00:00
2026-02-10T21:51:07.741000+00:00
[]
[ "openshift_lightspeed:openshift-lightspeed/lightspeed-service-api-rhel9", "red_hat_ansible_automation_platform_2:ansible-automation-platform-24/lightspeed-rhel8", "red_hat_ansible_automation_platform_2:ansible-automation-platform-25/lightspeed-rhel8", "red_hat_ansible_automation_platform_2:ansible-automation-...
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "workaround", "none_available" ]
[ "To mitigate this issue, manually validate that all image_url fields use the HTTP/HTTPS protocols, point to allowed public domains and do not resolve to internal IP addresses before passing messages to ChatOpenAI or any LangChain model.", "Fix deferred" ]
[ null, null ]
CVE-2026-23211
CWE-280
kernel
mm, swap: restore swap_space attr aviod kernel panic
Moderate
null
5.6/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
A flaw was found in the Linux kernel's memory management swap subsystem. A previous commit marked the swap address space as read-only, but when arch_prepare_to_swap() fails under heavy memory pressure, the kernel attempts to set a writeback error on the read-only mapping. This triggers a kernel panic during memory recl...
This issue can occur on systems under heavy memory pressure when swap operations fail and the kernel attempts to record the error. The panic occurs in the memory reclaim path, making it potentially triggerable by any workload that causes significant memory pressure. The fix restores the swap address space to read-write...
2026-02-18T00:00:00+00:00
2026-02-18T00:00:00+00:00
[]
[ "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_linux_6:kernel-abi-whitelists", "red_hat_enterprise_linux_6:kernel-bootwrapper", "red_hat_enterprise_linux_6:kernel-debug", "red_hat_enterprise_linux_6:kernel-debug-devel", "red_hat_enterprise_linux_6:kernel-devel", "red_hat_enterprise_linux_6:ker...
[ "red_hat_enterprise_linux_10:kernel", "red_hat_enterprise_linux_10:kernel-64k", "red_hat_enterprise_linux_10:kernel-64k-core", "red_hat_enterprise_linux_10:kernel-64k-debug", "red_hat_enterprise_linux_10:kernel-64k-debug-core", "red_hat_enterprise_linux_10:kernel-64k-debug-devel", "red_hat_enterprise_li...
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "no_fix_planned" ]
[ "Out of support scope" ]
[ null ]
CVE-2026-25795
CWE-476
ImageMagick
ImageMagick: Denial of Service due to NULL pointer dereference during temporary file creation failure
Moderate
null
5.3/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
A flaw was found in ImageMagick, a widely used image editing and manipulation software. This vulnerability arises from a NULL pointer dereference that occurs when the software attempts to create temporary files and fails. An attacker could exploit this issue to trigger an application crash, leading to a Denial of Servi...
This MODERATE impact flaw in ImageMagick can lead to a denial of service due to a NULL pointer dereference when processing a crafted SFW image file. The vulnerability occurs if temporary file creation fails during image processing. Red Hat Enterprise Linux 6 ELS and 7 ELS are affected by this flaw.
2026-02-24T02:01:08.280394+00:00
2026-02-24T00:54:34.640000+00:00
[]
[ "red_hat_enterprise_linux_6:ImageMagick", "red_hat_enterprise_linux_6:ImageMagick-c++", "red_hat_enterprise_linux_6:ImageMagick-c++-devel", "red_hat_enterprise_linux_6:ImageMagick-devel", "red_hat_enterprise_linux_6:ImageMagick-doc", "red_hat_enterprise_linux_6:ImageMagick-perl", "red_hat_enterprise_lin...
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "workaround", "no_fix_planned" ]
[ "To reduce the risk associated with this vulnerability, avoid processing untrusted SFW image files with ImageMagick. If ImageMagick is deployed in environments where it processes untrusted input, consider implementing sandboxing or resource limits for ImageMagick processes to contain potential crashes and limit imp...
[ null, null ]
End of preview. Expand in Data Studio

Dataset Card for RedHat-security-VeX

This Dataset is extracted from publicly available Vulnerability Exploitability eXchange (VEX) files published by Red Hat.

Dataset Details

Red Hat security data is a central source of truth for Red Hat products regarding published, known vulnerabilities. This data is published in form of Vulnerability Exploitability eXchange (VEX) available at: https://security.access.redhat.com/data/csaf/v2/vex/

This Dataset is created by extracting relevant information from this data and converting into a format, which can be used by models for fine-tuning or any other methods of data augmentation like RAG.

Data is extracted and uploaded using the following script: https://github.com/sidhpurwala-huzaifa/RedHat-security-vex-parser

  • Curated by: Huzaifa Sidhpurwala huzaifas@redhat.com
  • License: Creative Commons Attribution 4.0 International License

Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

References

Disclaimer

This is not an official Red Hat supported repository. Rather this Dataset is created as a personal effort by Huzaifa Sidhpurwala. Red Hat in no way is responsible for the correctness or the accuracy of this data

Downloads last month
63

Models trained or fine-tuned on huzaifas-sidhpurwala/RedHat-security-VeX

Collection including huzaifas-sidhpurwala/RedHat-security-VeX