Lenovo

Thinkagile Hx Enclosure Certified Node Firmware

15 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.35%
  • Published 13.09.2024 18:15:07
  • Last modified 14.09.2024 11:47:14

An input validation weakness was discovered in XCC that could allow a valid, authenticated XCC user with elevated privileges to perform command injection or cause a recoverable denial of service using a specially crafted file.

  • EPSS 1.44%
  • Published 13.09.2024 18:15:07
  • Last modified 14.09.2024 11:47:14

An input validation weakness was discovered in XCC that could allow a valid, authenticated XCC user with elevated privileges to perform command injection through specially crafted command line input in the XCC SSH captive shell.

  • EPSS 1.44%
  • Published 13.09.2024 18:15:06
  • Last modified 14.09.2024 11:47:14

A privilege escalation vulnerability was discovered in XCC that could allow a valid, authenticated XCC user with elevated privileges to perform command injection via specially crafted IPMI commands.

  • EPSS 1.18%
  • Published 13.09.2024 18:15:06
  • Last modified 14.09.2024 11:47:14

A privilege escalation vulnerability was discovered in XCC that could allow a valid, authenticated XCC user with elevated privileges to perform command injection via specially crafted file uploads.

  • EPSS 0.37%
  • Published 26.07.2024 20:15:04
  • Last modified 21.11.2024 09:26:07

A privilege escalation vulnerability was discovered in the SSH captive command shell interface that could allow an authenticated XCC user with elevated privileges to perform command injection via specially crafted file uploads.

  • EPSS 0.35%
  • Published 26.07.2024 20:15:04
  • Last modified 21.11.2024 09:26:07

A privilege escalation vulnerability was discovered in an upload processing functionality of XCC that could allow an authenticated XCC user with elevated privileges to perform command injection via specially crafted file uploads.

  • EPSS 0.37%
  • Published 26.07.2024 20:15:04
  • Last modified 21.11.2024 09:26:07

A privilege escalation vulnerability was discovered in XCC that could allow an authenticated XCC user with elevated privileges to perform command injection via specially crafted IPMI commands.

  • EPSS 0.37%
  • Published 26.07.2024 20:15:03
  • Last modified 21.11.2024 09:26:07

A privilege escalation vulnerability was discovered in the web interface or SSH captive command shell interface of XCC that could allow an authenticated XCC user with elevated privileges to perform command injection via a specially crafted request.

  • EPSS 0.29%
  • Published 26.07.2024 20:15:03
  • Last modified 21.11.2024 09:26:07

A privilege escalation vulnerability was discovered in XCC that could allow an authenticated XCC user with elevated privileges to execute arbitrary code via a specially crafted IPMI command.

  • EPSS 0.08%
  • Published 26.06.2023 20:15:10
  • Last modified 21.11.2024 07:59:42

A valid, authenticated user with limited privileges may be able to use specifically crafted web management server API calls to execute a limited number of commands on SMM v1, SMM v2, and FPC that the user does not normally have sufficient privileges ...