Total vulnerabilities in the database
A valid, authenticated user with limited privileges may be able to use specifically crafted web management server API calls to execute a limited number of commands on SMM v1, SMM v2, and FPC that the user does not normally have sufficient privileges to execute.
Software | From | Fixed in |
---|---|---|
lenovo / nextscale_n1200_enclosure_firmware | - | fhet60b-3.40 |
lenovo / thinkagile_cp-cb-10_firmware | - | tesm38c-1.26 |
lenovo / thinkagile_cp-cb-10e_firmware | - | tesm38c-1.26 |
lenovo / thinkagile_hx_enclosure_certified_node_firmware | - | tesm38c-1.26 |
lenovo / thinkagile_vx_enclosure_firmware | - | tesm38c-1.26 |
lenovo / thinksystem_d2_enclosure_firmware | - | tesm38c-1.26 |
lenovo / thinksystem_da240_enclosure_firmware | - | umsm10s-1.07 |
lenovo / thinksystem_dw612_enclosure_firmware | - | umsm10s-1.07 |