9 results (0.005 seconds)

CVSS: 7.0EPSS: 0%CPEs: 118EXPL: 0

A potential Time-of-Check to Time-of-Use (TOCTOU) vulnerability has been identified in certain HP PC products using AMI UEFI Firmware (system BIOS), which might allow arbitrary code execution. AMI has released updates to mitigate the potential vulnerability. • https://support.hp.com/us-en/document/ish_8642715-8642746-16/hpsbhf03850 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVSS: 7.0EPSS: 0%CPEs: 50EXPL: 0

A potential Time-of-Check to Time-of-Use (TOCTOU) vulnerability has been identified in certain HP PC products using AMI UEFI Firmware (system BIOS) which might allow arbitrary code execution, denial of service, and information disclosure. AMI has released updates to mitigate the potential vulnerability. • https://support.hp.com/us-en/document/ish_7394557-7394585-16/hpsbhf03829 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVSS: 7.8EPSS: 0%CPEs: 754EXPL: 0

HP has identified a potential vulnerability in BIOS firmware of some Workstation products. Firmware updates are being released to mitigate these potential vulnerabilities. • https://support.hp.com/us-en/document/ish_3982318-3982351-16/hpsbhf03735 •

CVSS: 7.8EPSS: 0%CPEs: 481EXPL: 0

A potential security vulnerability has been identified in the HP Jumpstart software, which might allow escalation of privilege. HP is recommending that customers uninstall HP Jumpstart and use myHP software. Se ha identificado una posible vulnerabilidad de seguridad en el software HP Jumpstart, que podría permitir una escalada de privilegios. HP recomienda que los clientes desinstalen HP Jumpstart y utilicen el software myHP. • https://support.hp.com/us-en/document/ish_6189329-6189528-16/hpsbhf03791 •

CVSS: 8.8EPSS: 0%CPEs: 384EXPL: 0

Potential vulnerabilities have been identified in UEFI firmware (BIOS) for some PC products which may allow escalation of privilege and arbitrary code execution. Se han identificado vulnerabilidades potenciales en el firmware UEFI (BIOS) de algunos productos de PC que pueden permitir una escalada de privilegios y una ejecución de código arbitrario • https://support.hp.com/us-en/document/ish_5661066-5661090-16 •