Page 44 of 421 results (0.008 seconds)

CVSS: 7.8EPSS: 0%CPEs: 54EXPL: 0

A potential vulnerability in the SMI callback function used in the EEPROM driver in some Lenovo Desktops and ThinkStation models may allow arbitrary code execution Una vulnerabilidad potencial en la función de devolución de llamada SMI usada en el controlador EEPROM en algunos modelos de Lenovo Desktops y ThinkStation puede permitir una ejecución de código arbitrario • https://support.lenovo.com/us/en/product_security/LEN-30042 •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

A denial of service vulnerability was reported in the Lenovo Vantage component called Lenovo System Interface Foundation prior to version 1.1.19.5 that could allow configuration files to be written to non-standard locations. Se reportó de una vulnerabilidad de denegación de servicio en el componente Lenovo Vantage llamado Lenovo System Interface Foundation versiones anteriores a 1.1.19.5, que podría permitir que los archivos de configuración se escribieran en ubicaciones no estándar • https://support.lenovo.com/us/en/product_security/LEN-38717 • CWE-276: Incorrect Default Permissions •

CVSS: 7.3EPSS: 0%CPEs: 1EXPL: 0

A race condition vulnerability was reported in Lenovo System Update prior to version 5.07.0106 that could allow escalation of privilege. Se reportó una vulnerabilidad de condición de carrera en Lenovo System Update versiones anteriores a 5.07.0106, que podría permitir una escalada de privilegios • https://support.lenovo.com/us/en/product_security/LEN-42150 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVSS: 6.3EPSS: 0%CPEs: 16EXPL: 0

A cross-site scripting (XSS) vulnerability was discovered in the legacy IBM and Lenovo System x IMM2 (Integrated Management Module 2), prior to version 5.60, embedded Baseboard Management Controller (BMC) web interface during an internal security review. This vulnerability could allow JavaScript code to be executed in the user's web browser if the user is convinced to visit a crafted URL, possibly through phishing. Successful exploitation requires specific knowledge about the user’s network to be included in the crafted URL. Impact is limited to the normal access restrictions and permissions of the user clicking the crafted URL, and subject to the user being able to connect to and already being authenticated to IMM2 or other systems. The JavaScript code is not executed on IMM2 itself. • https://support.lenovo.com/us/en/product_security/LEN-44717 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 2.4EPSS: 0%CPEs: 20EXPL: 0

In Lenovo systems, SMM BIOS Write Protection is used to prevent writes to SPI Flash. While this provides sufficient protection, an additional layer of protection is provided by SPI Protected Range Registers (PRx). After resuming from S3 sleep mode in various versions of BIOS for some Lenovo ThinkPad systems, the PRx is not set. This does not impact the SMM BIOS Write Protection, which keeps systems protected. En los sistemas Lenovo, SMM BIOS Write Protection es usada para impedir escrituras en la SPI Flash. • https://support.lenovo.com/us/en/product_security/LEN-30042 •