Skip to content

Commit 2fa86a1

Browse files
1 parent 3356af7 commit 2fa86a1

File tree

4 files changed

+148
-0
lines changed

4 files changed

+148
-0
lines changed
Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-5355-6wp2-29w4",
4+
"modified": "2024-02-19T06:30:33Z",
5+
"published": "2024-02-19T06:30:33Z",
6+
"aliases": [
7+
"CVE-2024-26328"
8+
],
9+
"details": "An issue was discovered in QEMU 7.1.0 through 8.2.1. register_vfs in hw/pci/pcie_sriov.c does not set NumVFs to PCI_SRIOV_TOTAL_VF, and thus interaction with hw/nvme/ctrl.c is mishandled.",
10+
"severity": [
11+
12+
],
13+
"affected": [
14+
15+
],
16+
"references": [
17+
{
18+
"type": "ADVISORY",
19+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26328"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://lore.kernel.org/all/20240213055345-mutt-send-email-mst%40kernel.org"
24+
}
25+
],
26+
"database_specific": {
27+
"cwe_ids": [
28+
29+
],
30+
"severity": null,
31+
"github_reviewed": false,
32+
"github_reviewed_at": null,
33+
"nvd_published_at": "2024-02-19T05:15:26Z"
34+
}
35+
}
Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-5jjq-8cvj-v6m9",
4+
"modified": "2024-02-19T06:30:33Z",
5+
"published": "2024-02-19T06:30:33Z",
6+
"aliases": [
7+
"CVE-2024-26318"
8+
],
9+
"details": "Serenity before 6.8.0 allows XSS via an email link because LoginPage.tsx permits return URLs that do not begin with a / character.",
10+
"severity": [
11+
12+
],
13+
"affected": [
14+
15+
],
16+
"references": [
17+
{
18+
"type": "ADVISORY",
19+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26318"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://serenity.is/docs/release-notes/6.8.0"
24+
}
25+
],
26+
"database_specific": {
27+
"cwe_ids": [
28+
29+
],
30+
"severity": null,
31+
"github_reviewed": false,
32+
"github_reviewed_at": null,
33+
"nvd_published_at": "2024-02-19T04:15:07Z"
34+
}
35+
}
Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-7m48-vw34-vw84",
4+
"modified": "2024-02-19T06:30:33Z",
5+
"published": "2024-02-19T06:30:33Z",
6+
"aliases": [
7+
"CVE-2024-26327"
8+
],
9+
"details": "An issue was discovered in QEMU 7.1.0 through 8.2.1. register_vfs in hw/pci/pcie_sriov.c mishandles the situation where a guest writes NumVFs greater than TotalVFs, leading to a buffer overflow in VF implementations.",
10+
"severity": [
11+
12+
],
13+
"affected": [
14+
15+
],
16+
"references": [
17+
{
18+
"type": "ADVISORY",
19+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26327"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://lore.kernel.org/all/20240214-reuse-v4-5-89ad093a07f4%40daynix.com"
24+
}
25+
],
26+
"database_specific": {
27+
"cwe_ids": [
28+
29+
],
30+
"severity": null,
31+
"github_reviewed": false,
32+
"github_reviewed_at": null,
33+
"nvd_published_at": "2024-02-19T05:15:22Z"
34+
}
35+
}
Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-p35x-5893-x6gp",
4+
"modified": "2024-02-19T06:30:33Z",
5+
"published": "2024-02-19T06:30:33Z",
6+
"aliases": [
7+
"CVE-2024-24722"
8+
],
9+
"details": "An unquoted service path vulnerability in the 12d Synergy Server and File Replication Server components may allow an attacker to gain elevated privileges via the 12d Synergy Server and/or 12d Synergy File Replication Server executable service path. This is fixed in 4.3.10.192, 5.1.5.221, and 5.1.6.235.",
10+
"severity": [
11+
12+
],
13+
"affected": [
14+
15+
],
16+
"references": [
17+
{
18+
"type": "ADVISORY",
19+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24722"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://files.12dsynergy.com/downloads/download.aspx"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "https://help.12dsynergy.com/v1/docs/cve-2024-24722"
28+
},
29+
{
30+
"type": "WEB",
31+
"url": "https://www.12dsynergy.com/security-statement"
32+
}
33+
],
34+
"database_specific": {
35+
"cwe_ids": [
36+
37+
],
38+
"severity": null,
39+
"github_reviewed": false,
40+
"github_reviewed_at": null,
41+
"nvd_published_at": "2024-02-19T06:15:07Z"
42+
}
43+
}

0 commit comments

Comments
 (0)