mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-05 10:18:17 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
59484ff868
commit
e109200cef
@ -41,7 +41,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Scheduler for TAS prior to version 1.4.0 was permitting plaintext transmission of UAA client token by sending it over a non-TLS connection. This also depended on the configuration of the MySQL server which is used to cache a UAA client token used by the service.\nIf intercepted the token can give an attacker admin level access in the cloud controller."
|
||||
"value": "Scheduler for TAS prior to version 1.4.0 was permitting plaintext transmission of UAA client token by sending it over a non-TLS connection. This also depended on the configuration of the MySQL server which is used to cache a UAA client token used by the service. If intercepted the token can give an attacker admin level access in the cloud controller."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -41,7 +41,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "In some Lenovo Desktop models, the Configuration Change Detection BIOS setting failed to detect SATA configuration changes. "
|
||||
"value": "In some Lenovo Desktop models, the Configuration Change Detection BIOS setting failed to detect SATA configuration changes."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -79,8 +79,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.lenovo.com/us/en/product_security/LEN-49266"
|
||||
"refsource": "MISC",
|
||||
"url": "https://support.lenovo.com/us/en/product_security/LEN-49266",
|
||||
"name": "https://support.lenovo.com/us/en/product_security/LEN-49266"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -73,15 +73,16 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.lenovo.com/us/en/product_security/LEN-44725"
|
||||
"refsource": "MISC",
|
||||
"url": "https://support.lenovo.com/us/en/product_security/LEN-44725",
|
||||
"name": "https://support.lenovo.com/us/en/product_security/LEN-44725"
|
||||
}
|
||||
]
|
||||
},
|
||||
"solution": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Use the Intel® AMT Configuration Utility 12.2.0.150 or later to verify the EHBC is enabled. \nCheck EHBC Status: ACUConfig.exe /verbose /output console Status\nTo disable Intel EHBC: ACUConfig.exe DisableEhbcState"
|
||||
"value": "Use the Intel\u00ae AMT Configuration Utility 12.2.0.150 or later to verify the EHBC is enabled. \nCheck EHBC Status: ACUConfig.exe /verbose /output console Status\nTo disable Intel EHBC: ACUConfig.exe DisableEhbcState"
|
||||
}
|
||||
],
|
||||
"source": {
|
||||
|
@ -41,7 +41,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A potential vulnerability in the SMI callback function used in the VariableServiceSmm driver in some Lenovo Notebook models may allow arbitrary code execution. "
|
||||
"value": "A potential vulnerability in the SMI callback function used in the VariableServiceSmm driver in some Lenovo Notebook models may allow arbitrary code execution."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -79,8 +79,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.lenovo.com/us/en/product_security/LEN-49266"
|
||||
"refsource": "MISC",
|
||||
"url": "https://support.lenovo.com/us/en/product_security/LEN-49266",
|
||||
"name": "https://support.lenovo.com/us/en/product_security/LEN-49266"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
Loading…
x
Reference in New Issue
Block a user