Vulnerabilities > Improper Restriction of Operations within the Bounds of a Memory Buffer

DATE CVE VULNERABILITY TITLE RISK
2024-01-16 CVE-2023-45235 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Tianocore Edk2
EDK2's Network Package is susceptible to a buffer overflow vulnerability when handling Server ID option from a DHCPv6 proxy Advertise message.
low complexity
tianocore CWE-119
8.8
2024-01-16 CVE-2023-51257 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Jasper Project Jasper
An invalid memory write issue in Jasper-Software Jasper v.4.1.1 and before allows a local attacker to execute arbitrary code.
local
low complexity
jasper-project CWE-119
7.8
2024-01-11 CVE-2024-0429 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Bpsoft HEX Workshop 6.7.0/6.7.2/6.7.3
A denial service vulnerability has been found on  Hex Workshop affecting version 6.7, an attacker could send a command line file arguments and control the Structured Exception Handler (SEH) records resulting in a service shutdown.
local
low complexity
bpsoft CWE-119
5.5
2024-01-09 CVE-2023-34332 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in AMI Megarac Sp-X 12/13
AMI’s SPx contains a vulnerability in the BMC where an Attacker may cause an untrusted pointer to dereference by a local network.
local
low complexity
ami CWE-119
7.8
2024-01-09 CVE-2023-34333 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in AMI Megarac Sp-X 12/13
AMI’s SPx contains a vulnerability in the BMC where an Attacker may cause an untrusted pointer to dereference via a local network.
local
low complexity
ami CWE-119
7.8
2024-01-09 CVE-2022-36763 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Tianocore Edk2
EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network.
local
low complexity
tianocore CWE-119
7.8
2024-01-09 CVE-2022-36764 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Tianocore Edk2
EDK2 is susceptible to a vulnerability in the Tcg2MeasurePeImage() function, allowing a user to trigger a heap buffer overflow via a local network.
local
low complexity
tianocore CWE-119
7.8
2024-01-09 CVE-2022-36765 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Tianocore Edk2
EDK2 is susceptible to a vulnerability in the CreateHob() function, allowing a user to trigger a integer overflow to buffer overflow via a local network.
local
low complexity
tianocore CWE-119
7.8
2024-01-08 CVE-2023-34087 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Tonybybell Gtkwave 3.3.115
An improper array index validation vulnerability exists in the EVCD var len parsing functionality of GTKWave 3.3.115.
local
low complexity
tonybybell CWE-119
7.8
2024-01-08 CVE-2023-35955 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Tonybybell Gtkwave 3.3.115
Multiple heap-based buffer overflow vulnerabilities exist in the fstReaderIterBlocks2 VCDATA parsing functionality of GTKWave 3.3.115.
local
low complexity
tonybybell CWE-119
7.8