"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-04-22 21:01:34 +00:00
parent 6c54575035
commit 3d43fc05e5
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
16 changed files with 61 additions and 42 deletions

View File

@ -31,7 +31,7 @@
"credit": [
{
"lang": "eng",
"value": "Lenovo thanks renweijun(任卫军), from Sangfor TIT(Sangfor Threat Intelligence Team) for reporting this issue."
"value": "Lenovo thanks renweijun(\u4efb\u536b\u519b), from Sangfor TIT(Sangfor Threat Intelligence Team) for reporting this issue."
}
],
"data_format": "MITRE",
@ -79,8 +79,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://iknow.lenovo.com.cn/detail/dc_200016.html"
"refsource": "MISC",
"url": "https://iknow.lenovo.com.cn/detail/dc_200016.html",
"name": "https://iknow.lenovo.com.cn/detail/dc_200016.html"
}
]
},

View File

@ -79,8 +79,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://iknow.lenovo.com.cn/detail/dc_199218.html"
"refsource": "MISC",
"url": "https://iknow.lenovo.com.cn/detail/dc_199218.html",
"name": "https://iknow.lenovo.com.cn/detail/dc_199218.html"
}
]
},

View File

@ -53,7 +53,7 @@
"description_data": [
{
"lang": "eng",
"value": "Versions of Motorola Ready For and Motorola Device Help Android applications prior to 2021-04-08 do not properly verify the server certificate which could lead to the communication channel being accessible by an attacker. "
"value": "Versions of Motorola Ready For and Motorola Device Help Android applications prior to 2021-04-08 do not properly verify the server certificate which could lead to the communication channel being accessible by an attacker."
}
]
},
@ -91,8 +91,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://support.lenovo.com/us/en/product_security/LEN-58311"
"refsource": "MISC",
"url": "https://support.lenovo.com/us/en/product_security/LEN-58311",
"name": "https://support.lenovo.com/us/en/product_security/LEN-58311"
}
]
},

View File

@ -31,7 +31,7 @@
"credit": [
{
"lang": "eng",
"value": " Lenovo thanks Martin Smolár from ESET for reporting this issue."
"value": " Lenovo thanks Martin Smol\u00e1r from ESET for reporting this issue."
}
],
"data_format": "MITRE",
@ -79,8 +79,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://support.lenovo.com/us/en/product_security/LEN-73440"
"refsource": "MISC",
"url": "https://support.lenovo.com/us/en/product_security/LEN-73440",
"name": "https://support.lenovo.com/us/en/product_security/LEN-73440"
}
]
},

View File

@ -31,7 +31,7 @@
"credit": [
{
"lang": "eng",
"value": " Lenovo thanks Martin Smolár from ESET for reporting this issue."
"value": " Lenovo thanks Martin Smol\u00e1r from ESET for reporting this issue."
}
],
"data_format": "MITRE",
@ -79,8 +79,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://support.lenovo.com/us/en/product_security/LEN-73440"
"refsource": "MISC",
"url": "https://support.lenovo.com/us/en/product_security/LEN-73440",
"name": "https://support.lenovo.com/us/en/product_security/LEN-73440"
}
]
},

View File

@ -31,7 +31,7 @@
"credit": [
{
"lang": "eng",
"value": " Lenovo thanks Martin Smolár from ESET for reporting this issue."
"value": " Lenovo thanks Martin Smol\u00e1r from ESET for reporting this issue."
}
],
"data_format": "MITRE",
@ -79,8 +79,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://support.lenovo.com/us/en/product_security/LEN-73440"
"refsource": "MISC",
"url": "https://support.lenovo.com/us/en/product_security/LEN-73440",
"name": "https://support.lenovo.com/us/en/product_security/LEN-73440"
}
]
},

View File

@ -79,8 +79,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://support.lenovo.com/us/en/product_security/LEN-77639"
"refsource": "MISC",
"url": "https://support.lenovo.com/us/en/product_security/LEN-77639",
"name": "https://support.lenovo.com/us/en/product_security/LEN-77639"
}
]
},

View File

@ -41,7 +41,7 @@
"description_data": [
{
"lang": "eng",
"value": "A potential vulnerability in the SMI callback function used in the SMBIOS event log driver in some Lenovo Desktop, ThinkStation, and ThinkEdge models may allow an attacker with local access and elevated privileges to execute arbitrary code. "
"value": "A potential vulnerability in the SMI callback function used in the SMBIOS event log driver in some Lenovo Desktop, ThinkStation, and ThinkEdge models may allow an attacker with local access and elevated privileges to execute arbitrary code."
}
]
},
@ -79,8 +79,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://support.lenovo.com/us/en/product_security/LEN-77639"
"refsource": "MISC",
"url": "https://support.lenovo.com/us/en/product_security/LEN-77639",
"name": "https://support.lenovo.com/us/en/product_security/LEN-77639"
}
]
},

View File

@ -41,7 +41,7 @@
"description_data": [
{
"lang": "eng",
"value": "A potential vulnerability in the SMI callback function used in the Legacy BIOS mode driver in some Lenovo Notebook models may allow an attacker with local access and elevated privileges to execute arbitrary code. "
"value": "A potential vulnerability in the SMI callback function used in the Legacy BIOS mode driver in some Lenovo Notebook models may allow an attacker with local access and elevated privileges to execute arbitrary code."
}
]
},
@ -79,8 +79,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://support.lenovo.com/us/en/product_security/LEN-77639"
"refsource": "MISC",
"url": "https://support.lenovo.com/us/en/product_security/LEN-77639",
"name": "https://support.lenovo.com/us/en/product_security/LEN-77639"
}
]
},

View File

@ -79,8 +79,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://iknow.lenovo.com.cn/detail/dc_201470.html"
"refsource": "MISC",
"url": "https://iknow.lenovo.com.cn/detail/dc_201470.html",
"name": "https://iknow.lenovo.com.cn/detail/dc_201470.html"
}
]
},

View File

@ -79,8 +79,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://support.lenovo.com/us/en/product_security/LEN-76673"
"refsource": "MISC",
"url": "https://support.lenovo.com/us/en/product_security/LEN-76673",
"name": "https://support.lenovo.com/us/en/product_security/LEN-76673"
}
]
},

View File

@ -79,8 +79,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://support.lenovo.com/us/en/product_security/LEN-78116"
"refsource": "MISC",
"url": "https://support.lenovo.com/us/en/product_security/LEN-78116",
"name": "https://support.lenovo.com/us/en/product_security/LEN-78116"
}
]
},

View File

@ -41,7 +41,7 @@
"description_data": [
{
"lang": "eng",
"value": "A potential vulnerability due to use of Boot Services in the SmmOEMInt15 SMI handler in some ThinkPad models could be exploited by an attacker with elevated privileges that could allow for execution of code."
"value": "A potential vulnerability due to use of Boot Services in the SmmOEMInt15 SMI handler in some ThinkPad models could be exploited by an attacker with elevated privileges that could allow for execution of code."
}
]
},
@ -79,8 +79,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://support.lenovo.com/us/en/product_security/LEN-84943"
"refsource": "MISC",
"url": "https://support.lenovo.com/us/en/product_security/LEN-84943",
"name": "https://support.lenovo.com/us/en/product_security/LEN-84943"
}
]
},

View File

@ -41,7 +41,7 @@
"description_data": [
{
"lang": "eng",
"value": " A potential vulnerability due to improper buffer validation in the SMI handler LenovoFlashDeviceInterface in Thinkpad X1 Fold Gen 1 could be exploited by an attacker with local access and elevated privileges to execute arbitrary code."
"value": "A potential vulnerability due to improper buffer validation in the SMI handler LenovoFlashDeviceInterface in Thinkpad X1 Fold Gen 1 could be exploited by an attacker with local access and elevated privileges to execute arbitrary code."
}
]
},
@ -79,8 +79,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://support.lenovo.com/us/en/product_security/LEN-84943"
"refsource": "MISC",
"url": "https://support.lenovo.com/us/en/product_security/LEN-84943",
"name": "https://support.lenovo.com/us/en/product_security/LEN-84943"
}
]
},

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2022-24874",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
@ -15,4 +15,4 @@
}
]
}
}
}

View File

@ -56,6 +56,11 @@
"url": "https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2021-1738",
"refsource": "MISC",
"name": "https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2021-1738"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20220422 CVE-2022-29464 :: WSO2 Unrestricted arbitrary file upload, and remote code to execution vulnerability.",
"url": "http://www.openwall.com/lists/oss-security/2022/04/22/7"
}
]
},