Vulnerabilities
Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.
| ID | Title | |
|---|---|---|
| CVE-2017-3764 |
|
Information Disclosure in lenovo (CVE-2017-3764)
vulnerability in lenovo (CVE-2017-3764). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-3767 |
|
Vulnerability in privilege-escalation (CVE-2017-3767)
vulnerability in privilege-escalation (CVE-2017-3767). Successful exploitation can lead to full system takeover.
|
| CVE-2017-3771 |
|
Vulnerability in lenovo (CVE-2017-3771)
vulnerability in lenovo (CVE-2017-3771). Data can be tampered with by attackers.
|
| CVE-2017-3761 |
|
OS Command Injection in lenovo (CVE-2017-3761)
OS command injection in lenovo (CVE-2017-3761). Successful exploitation can lead to full system takeover.
|
| CVE-2017-3760 |
|
Vulnerability in lenovo (CVE-2017-3760)
vulnerability in lenovo (CVE-2017-3760). Successful exploitation can lead to full system takeover.
|
| CVE-2017-3759 |
|
Vulnerability in lenovo (CVE-2017-3759)
vulnerability in lenovo (CVE-2017-3759). Successful exploitation can lead to full system takeover.
|
| CVE-2017-3758 |
|
Vulnerability in lenovo (CVE-2017-3758)
vulnerability in lenovo (CVE-2017-3758). Successful exploitation can lead to full system takeover.
|
| CVE-2017-15361 |
|
Vulnerability in infineon (CVE-2017-15361)
vulnerability in infineon (CVE-2017-15361). Confidential information can be exposed externally.
|
| CVE-2015-6971 |
|
Command Injection in lenovo (CVE-2015-6971)
command injection in lenovo (CVE-2015-6971). Successful exploitation can lead to full system takeover.
|
| CVE-2015-3321 |
|
Vulnerability in lenovo (CVE-2015-3321)
vulnerability in lenovo (CVE-2015-3321). Successful exploitation can lead to full system takeover.
|
| CVE-2017-3770 |
|
Vulnerability in privilege-escalation (CVE-2017-3770)
vulnerability in privilege-escalation (CVE-2017-3770). Successful exploitation can lead to full system takeover.
|
| CVE-2017-3763 |
|
Vulnerability in lenovo (CVE-2017-3763)
vulnerability in lenovo (CVE-2017-3763). Successful exploitation can lead to full system takeover.
|
| CVE-2017-3746 |
|
Vulnerability in privilege-escalation (CVE-2017-3746)
vulnerability in privilege-escalation (CVE-2017-3746). Successful exploitation can lead to full system takeover.
|
| CVE-2017-3756 |
|
Vulnerability in privilege-escalation (CVE-2017-3756)
vulnerability in privilege-escalation (CVE-2017-3756). Successful exploitation can lead to full system takeover.
|
| CVE-2017-3753 |
|
Code Injection in lenovo (CVE-2017-3753)
code injection in lenovo (CVE-2017-3753). Successful exploitation can lead to full system takeover.
|
| CVE-2017-3751 |
|
Vulnerability in lenovo (CVE-2017-3751)
vulnerability in lenovo (CVE-2017-3751). Successful exploitation can lead to full system takeover.
|
| CVE-2017-3752 |
|
Vulnerability in ibm (CVE-2017-3752)
vulnerability in ibm (CVE-2017-3752). Data can be tampered with by attackers.
|
| CVE-2017-3754 |
|
Vulnerability in lenovo (CVE-2017-3754)
vulnerability in lenovo (CVE-2017-3754). Successful exploitation can lead to full system takeover.
|
| CVE-2017-3742 |
|
Information Disclosure in lenovo (CVE-2017-3742)
vulnerability in lenovo (CVE-2017-3742). Confidential information can be exposed externally.
|
| CVE-2017-3748 |
|
Vulnerability in google (CVE-2017-3748)
vulnerability in google (CVE-2017-3748). Successful exploitation can lead to full system takeover.
|
| CVE-2017-3750 |
|
Vulnerability in privilege-escalation (CVE-2017-3750)
vulnerability in privilege-escalation (CVE-2017-3750). Successful exploitation can lead to full system takeover.
|
| CVE-2017-3749 |
|
Vulnerability in c (CVE-2017-3749)
vulnerability in c (CVE-2017-3749). Successful exploitation can lead to full system takeover.
|
| CVE-2017-3747 |
|
Vulnerability in privilege-escalation (CVE-2017-3747)
vulnerability in privilege-escalation (CVE-2017-3747). Data can be tampered with by attackers.
|
| CVE-2017-3745 |
|
Authentication Bypass in lenovo (CVE-2017-3745)
authentication bypass in lenovo (CVE-2017-3745). Successful exploitation can lead to full system takeover.
|
| CVE-2017-3744 |
|
Vulnerability in lenovo (CVE-2017-3744)
vulnerability in lenovo (CVE-2017-3744). Confidential information can be exposed externally.
|
| CVE-2017-3743 |
|
Information Disclosure in lenovo (CVE-2017-3743)
vulnerability in lenovo (CVE-2017-3743). Successful exploitation can lead to full system takeover.
|
| CVE-2015-4596 |
|
Vulnerability in lenovo (CVE-2015-4596)
vulnerability in lenovo (CVE-2015-4596). Successful exploitation can lead to full system takeover.
|
| CVE-2016-8229 |
|
Cross-Site Request Forgery (CSRF) in lenovo (CVE-2016-8229)
vulnerability in lenovo (CVE-2016-8229). Successful exploitation can lead to full system takeover.
|
| CVE-2016-8228 |
|
Vulnerability in lenovo (CVE-2016-8228)
vulnerability in lenovo (CVE-2016-8228). Successful exploitation can lead to full system takeover.
|
| CVE-2016-8230 |
|
Information Disclosure in lenovo (CVE-2016-8230)
vulnerability in lenovo (CVE-2016-8230). Confidential information can be exposed externally.
|
| CVE-2016-8231 |
|
Vulnerability in lenovo (CVE-2016-8231)
vulnerability in lenovo (CVE-2016-8231). Data can be tampered with by attackers.
|
| CVE-2017-3740 |
|
Vulnerability in dos (CVE-2017-3740)
vulnerability in dos (CVE-2017-3740). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-3741 |
|
Vulnerability in lenovo (CVE-2017-3741)
vulnerability in lenovo (CVE-2017-3741). Risk of unauthorized operations or information disclosure.
|
| CVE-2016-1876 |
|
Vulnerability in lenovo (CVE-2016-1876)
vulnerability in lenovo (CVE-2016-1876). Successful exploitation can lead to full system takeover.
|
| CVE-2015-8110 |
|
Vulnerability in privilege-escalation (CVE-2015-8110)
vulnerability in privilege-escalation (CVE-2015-8110). Successful exploitation can lead to full system takeover.
|
| CVE-2015-8109 |
|
Vulnerability in lenovo (CVE-2015-8109)
vulnerability in lenovo (CVE-2015-8109). Successful exploitation can lead to full system takeover.
|
| CVE-2016-8237 |
|
Vulnerability in lenovo (CVE-2016-8237)
vulnerability in lenovo (CVE-2016-8237). Successful exploitation can lead to full system takeover.
|
| CVE-2016-8235 |
|
Vulnerability in privilege-escalation (CVE-2016-8235)
vulnerability in privilege-escalation (CVE-2016-8235). Successful exploitation can lead to full system takeover.
|
| CVE-2016-8236 |
|
Vulnerability in lenovo (CVE-2016-8236)
vulnerability in lenovo (CVE-2016-8236). Data can be tampered with by attackers.
|
| CVE-2016-8233 |
|
Vulnerability in lenovo (CVE-2016-8233)
vulnerability in lenovo (CVE-2016-8233). Successful exploitation can lead to full system takeover.
|
| CVE-2016-8225 |
|
Vulnerability in lenovo (CVE-2016-8225)
vulnerability in lenovo (CVE-2016-8225). Successful exploitation can lead to full system takeover.
|
| CVE-2016-8227 |
|
Vulnerability in privilege-escalation (CVE-2016-8227)
vulnerability in privilege-escalation (CVE-2016-8227). Successful exploitation can lead to full system takeover.
|
| CVE-2016-8226 |
|
Vulnerability in dos (CVE-2016-8226)
vulnerability in dos (CVE-2016-8226). Risk of unauthorized operations or information disclosure.
|