Lenovo

Thinkagile Hx2321 Firmware

17 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.37%
  • Published 26.07.2024 20:15:04
  • Last modified 21.11.2024 09:26:07

A privilege escalation vulnerability was discovered in XCC that could allow an authenticated XCC user with elevated privileges to perform command injection via specially crafted IPMI commands.

  • EPSS 0.35%
  • Published 26.07.2024 20:15:04
  • Last modified 21.11.2024 09:26:07

A privilege escalation vulnerability was discovered in an upload processing functionality of XCC that could allow an authenticated XCC user with elevated privileges to perform command injection via specially crafted file uploads.

  • EPSS 0.37%
  • Published 26.07.2024 20:15:04
  • Last modified 21.11.2024 09:26:07

A privilege escalation vulnerability was discovered in the SSH captive command shell interface that could allow an authenticated XCC user with elevated privileges to perform command injection via specially crafted file uploads.

  • EPSS 0.29%
  • Published 26.07.2024 20:15:03
  • Last modified 21.11.2024 09:26:07

A privilege escalation vulnerability was discovered in XCC that could allow an authenticated XCC user with elevated privileges to execute arbitrary code via a specially crafted IPMI command.

  • EPSS 0.37%
  • Published 26.07.2024 20:15:03
  • Last modified 21.11.2024 09:26:07

A privilege escalation vulnerability was discovered in the web interface or SSH captive command shell interface of XCC that could allow an authenticated XCC user with elevated privileges to perform command injection via a specially crafted request.

  • EPSS 0.43%
  • Published 15.04.2024 18:15:10
  • Last modified 28.07.2025 13:06:05

A command injection vulnerability was identified in SMM/SMM2 and FPC that could allow an authenticated user with elevated privileges to execute system commands when performing a specific administrative function.

  • EPSS 0.13%
  • Published 25.10.2023 18:17:41
  • Last modified 21.11.2024 08:35:32

An authenticated XCC user can change permissions for any user through a crafted API command.

  • EPSS 0.24%
  • Published 01.05.2023 15:15:09
  • Last modified 21.11.2024 07:37:37

A valid, authenticated XCC user with read only access may gain elevated privileges through a specifically crafted API call.

  • EPSS 0.15%
  • Published 01.05.2023 15:15:09
  • Last modified 21.11.2024 07:49:36

A valid, authenticated user may be able to trigger a denial of service of the XCC web user interface or other undefined behavior through a format string injection vulnerability in a web interface API.

  • EPSS 0.15%
  • Published 28.04.2023 22:15:09
  • Last modified 21.11.2024 07:56:27

A valid LDAP user, under specific conditions, will default to read-only permissions when authenticating into XCC. To be vulnerable, XCC must be configured to use an LDAP server for Authentication/Authorization and have the login permission attribute ...