- Synchronized data.

This commit is contained in:
CVE Team 2018-11-16 09:06:54 -05:00
parent 868c4de8ff
commit 4254f82e98
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
5 changed files with 11 additions and 7 deletions

View File

@ -58,9 +58,9 @@
"url" : "https://www.exploit-db.com/exploits/44839/"
},
{
"name" : "https://gist.github.com/huykha/409451e4b086bfbd55e28e7e803ae930",
"refsource" : "MISC",
"url" : "https://gist.github.com/huykha/409451e4b086bfbd55e28e7e803ae930"
"name" : "https://support.brother.com/g/b/faqend.aspx?c=us_ot&lang=en&prod=group2&ftype3=100033&faqid=faq00100530_000",
"refsource" : "CONFIRM",
"url" : "https://support.brother.com/g/b/faqend.aspx?c=us_ot&lang=en&prod=group2&ftype3=100033&faqid=faq00100530_000"
}
]
}

View File

@ -36,7 +36,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "Lenovo Chassis Management Module (CMM) prior to version 2.0.0 allows unauthenticated users to retrieve information related to the current authentication configuration settings. Exposed settings relate to password lengths, expiration, and lockout configuration. "
"value" : "Lenovo Chassis Management Module (CMM) prior to version 2.0.0 allows unauthenticated users to retrieve information related to the current authentication configuration settings. Exposed settings relate to password lengths, expiration, and lockout configuration."
}
]
},
@ -55,6 +55,7 @@
"references" : {
"reference_data" : [
{
"name" : "https://support.lenovo.com/us/en/solutions/LEN-23806",
"refsource" : "CONFIRM",
"url" : "https://support.lenovo.com/us/en/solutions/LEN-23806"
}

View File

@ -36,7 +36,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "Lenovo Chassis Management Module (CMM) prior to version 2.0.0 utilizes a hardcoded encryption key to protect certain secrets. Possession of the key can allow an attacker that has already compromised the server to decrypt these secrets. "
"value" : "Lenovo Chassis Management Module (CMM) prior to version 2.0.0 utilizes a hardcoded encryption key to protect certain secrets. Possession of the key can allow an attacker that has already compromised the server to decrypt these secrets."
}
]
},
@ -55,6 +55,7 @@
"references" : {
"reference_data" : [
{
"name" : "https://support.lenovo.com/us/en/solutions/LEN-23806",
"refsource" : "CONFIRM",
"url" : "https://support.lenovo.com/us/en/solutions/LEN-23806"
}

View File

@ -54,7 +54,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "A write protection lock bit was left unset after boot on an older generation of Lenovo and IBM System x servers, potentially allowing an attacker with administrator access to modify the subset of flash memory containing Intel Server Platform Services (SPS) and the system Flash Descriptors. "
"value" : "A write protection lock bit was left unset after boot on an older generation of Lenovo and IBM System x servers, potentially allowing an attacker with administrator access to modify the subset of flash memory containing Intel Server Platform Services (SPS) and the system Flash Descriptors."
}
]
},
@ -73,6 +73,7 @@
"references" : {
"reference_data" : [
{
"name" : "https://support.lenovo.com/us/en/solutions/LEN-24477",
"refsource" : "CONFIRM",
"url" : "https://support.lenovo.com/us/en/solutions/LEN-24477"
}

View File

@ -36,7 +36,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "In some Lenovo ThinkServer-branded servers, a command injection vulnerability exists in the BMC firmware download command. This allows a privileged user to download and execute arbitrary code inside the BMC. This can only be exploited by authorized privileged users."
"value" : "In some Lenovo ThinkServer-branded servers, a command injection vulnerability exists in the BMC firmware download command. This allows a privileged user to download and execute arbitrary code inside the BMC. This can only be exploited by authorized privileged users."
}
]
},
@ -55,6 +55,7 @@
"references" : {
"reference_data" : [
{
"name" : "https://support.lenovo.com/us/en/solutions/LEN-23836",
"refsource" : "CONFIRM",
"url" : "https://support.lenovo.com/us/en/solutions/LEN-23836"
}