CVE-2022-36763
- EPSS 0.05%
- Published 09.01.2024 16:15:43
- Last modified 13.02.2025 17:15:41
EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrit...
CVE-2021-38578
- EPSS 0.06%
- Published 03.03.2022 22:15:08
- Last modified 21.11.2024 06:17:33
Existing CommBuffer checks in SmmEntryPoint will not catch underflow when computing BufferSize.
CVE-2021-38576
- EPSS 0.18%
- Published 03.01.2022 22:15:09
- Last modified 21.11.2024 06:17:33
A BIOS bug in firmware for a particular PC model leaves the Platform authorization value empty. This can be used to permanently brick the TPM in multiple ways, as well as to non-permanently DoS the system.
CVE-2021-38575
- EPSS 0.51%
- Published 01.12.2021 18:15:07
- Last modified 21.11.2024 06:17:32
NetworkPkg/IScsiDxe has remotely exploitable buffer overflows.
CVE-2021-28213
- EPSS 0.37%
- Published 11.06.2021 16:15:12
- Last modified 21.11.2024 05:59:22
Example EDK2 encrypted private key in the IpSecDxe.efi present potential security risks.
CVE-2021-28211
- EPSS 0.06%
- Published 11.06.2021 16:15:12
- Last modified 21.11.2024 05:59:22
A heap overflow in LzmaUefiDecompressGetInfo function in EDK II.
CVE-2021-28210
- EPSS 0.06%
- Published 11.06.2021 16:15:12
- Last modified 21.11.2024 05:59:22
An unlimited recursion in DxeCore in EDK II.
CVE-2019-14584
- EPSS 0.11%
- Published 03.06.2021 20:15:08
- Last modified 21.11.2024 04:26:59
Null pointer dereference in Tianocore EDK2 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2019-14587
- EPSS 0.19%
- Published 23.11.2020 17:15:12
- Last modified 21.11.2024 04:26:59
Logic issue EDK II may allow an unauthenticated user to potentially enable denial of service via adjacent access.
- EPSS 0.14%
- Published 23.11.2020 17:15:12
- Last modified 21.11.2024 04:26:59
Use after free vulnerability in EDK II may allow an authenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via adjacent access.