cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2015-8536,https://securityvulnerability.io/vulnerability/CVE-2015-8536,Cross-Site Request Forgery Vulnerability in Lenovo Solution Center,"A vulnerability was identified in Lenovo Solution Center (LSC) before version 3.3.002, which could allow an attacker to perform unauthorized actions on behalf of a user without their consent. This cross-site request forgery (CSRF) flaw poses a significant risk to users, enabling potential exploitation through crafted requests that misuse the authenticated session of the user.",Lenovo,Solution Center,8.8,HIGH,0.0007300000288523734,false,,false,false,false,,,false,false,,2020-03-27T14:05:01.000Z,0 CVE-2015-8535,https://securityvulnerability.io/vulnerability/CVE-2015-8535,Directory Traversal Vulnerability in Lenovo Solution Center,"A directory traversal vulnerability was identified in Lenovo Solution Center, affecting versions prior to 3.3.002. This flaw allows an attacker to manipulate file paths, potentially leading to the execution of arbitrary code with elevated privileges. Users of affected versions are strongly encouraged to upgrade to mitigate this risk.",Lenovo,Solution Center,7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2020-03-27T14:05:01.000Z,0 CVE-2015-8534,https://securityvulnerability.io/vulnerability/CVE-2015-8534,Local Privilege Escalation Vulnerability in Lenovo Solution Center,"A local privilege escalation vulnerability was identified in Lenovo Solution Center, allowing an attacker with local access to execute arbitrary code with elevated privileges. This issue primarily affects versions of the software prior to 3.3.002, leading to potential unauthorized actions and compromises in system security.",Lenovo,Solution Center,7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2020-03-27T14:05:01.000Z,0 CVE-2019-6177,https://securityvulnerability.io/vulnerability/CVE-2019-6177,Privilege Escalation Vulnerability in Lenovo Solution Center by Lenovo,"A vulnerability in Lenovo Solution Center enables log files to be written to non-standard locations, which could potentially allow an attacker to escalate privileges within the system. This poses a significant security risk, especially since Lenovo has discontinued support for this software version, urging users to transition to Lenovo Vantage or Lenovo Diagnostics.",Lenovo,Solution Center,7.8,HIGH,0.002219999907538295,false,,false,false,false,,,false,false,,2019-08-20T00:00:00.000Z,0 CVE-2016-1876,https://securityvulnerability.io/vulnerability/CVE-2016-1876,,The backend service process in Lenovo Solution Center (aka LSC) before 3.3.0002 allows local users to gain SYSTEM privileges via unspecified vectors.,Lenovo,Solution Center,7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2017-05-23T03:56:00.000Z,0 CVE-2016-5249,https://securityvulnerability.io/vulnerability/CVE-2016-5249,,Lenovo Solution Center (LSC) before 3.3.003 allows local users to execute arbitrary code with LocalSystem privileges via vectors involving the LSC.Services.SystemService StartProxy command with a named pipe created in advance and crafted .NET assembly.,Lenovo,Solution Center,7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2016-06-30T16:00:00.000Z,0 CVE-2016-5248,https://securityvulnerability.io/vulnerability/CVE-2016-5248,,The StopProxy command in LSC.Services.SystemService in Lenovo Solution Center before 3.3.003 allows local users to terminate arbitrary processes via the PID argument.,Lenovo,Solution Center,5.5,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2016-06-30T16:00:00.000Z,0